{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:12:08Z","timestamp":1768680728753,"version":"3.49.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"bilateral MESRI-BMBF project \u201cAPRIORI\u201d from the ANR Cybersecurity 2020 Call"},{"name":"Horizon 2020 \u201cSPARTA\u201d project","award":["830892"],"award-info":[{"award-number":["830892"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation Award","doi-asserted-by":"publisher","award":["1920079"],"award-info":[{"award-number":["1920079"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1109\/tvlsi.2021.3129141","type":"journal-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T20:31:36Z","timestamp":1641328296000},"page":"187-200","source":"Crossref","is-referenced-by-count":10,"title":["Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4609-7018","authenticated-orcid":false,"given":"Trevor","family":"Kroeger","sequence":"first","affiliation":[]},{"given":"Wei","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5044-3534","authenticated-orcid":false,"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5063-7964","authenticated-orcid":false,"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5825-6637","authenticated-orcid":false,"given":"Naghmeh","family":"Karimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5745-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2012.22"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12942-2_24"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2017.20"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2019.8855828"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845456"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2016.7870046"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2018.8541493"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD49232.2020.9218396"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7873\/DATE2014.361"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"ref16","first-page":"632","article-title":"Combined modeling and side channel attacks on strong PUFs","volume-title":"Proc. IACR","author":"Mahmoud"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_26"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116428"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263957"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2011.49"},{"key":"ref22","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th Annu. Design Autom. Conf.","author":"Suh"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581579"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.243-290"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2986887"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.97-120"},{"key":"ref28","first-page":"471","article-title":"Interpose PUF can be PAC Learned","volume-title":"Proc. IACR","author":"Chatterjee"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68773-1_14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77424-0_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71829-3_2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/e23010016"},{"key":"ref33","first-page":"287","article-title":"Active and passive side-channel attacks on delay based PUF designs","volume-title":"Proc. IACR","author":"Becker"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0064"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ITC44778.2020.9325241"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11766-003-0059-5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9272-4"},{"issue":"1","key":"ref38","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474137"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68773-1_14"},{"key":"ref42","volume-title":"Nangate 45 nm Open Cell Library","year":"2021"},{"key":"ref43","volume-title":"HSPICE User Guide: Basic Simulation and Analysis","year":"2016"},{"key":"ref44","article-title":"Architectural bias: A novel statistical metric to evaluate arbiter PUF variants","author":"Sahoo","year":"2016"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_12"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_20"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3062755"},{"key":"ref48","volume-title":"Virtualyzr Tool (VTZ)","year":"2017"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/92\/9705196\/9669128-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/9705196\/09669128.pdf?arnumber=9669128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T21:32:11Z","timestamp":1705181531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9669128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":48,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2021.3129141","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2]]}}}