{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:39Z","timestamp":1750306899314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517300.2517304","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"43-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes"],"prefix":"10.1145","author":[{"given":"Matthias","family":"Hiller","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Michael","family":"Weiner","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Leandro","family":"Rodrigues Lima","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Maximilian","family":"Birkner","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"J. Petit C. Bosch M. Feiri and F. Kargl \"On the potential of PUF for pseudonym generation in vehicular networks \" in IEEE Vehicular Networking Conference (VNC) 2012 pp. 94--100. J. Petit C. Bosch M. Feiri and F. Kargl \"On the potential of PUF for pseudonym generation in vehicular networks \" in IEEE Vehicular Networking Conference (VNC) 2012 pp. 94--100.","DOI":"10.1109\/VNC.2012.6407450"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225058"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.16"},{"key":"e_1_3_2_1_6_1","first-page":"1137","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"van der Leest V.","year":"2013"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"T. Esbach W. Fumy O. Kulikovska D. Merli D. Schuster and F. Stumpf \"A new security architecture for smartcards utilizing PUFs \" in Information Security Solutions Europe (ISSE) 2012. T. Esbach W. Fumy O. Kulikovska D. Merli D. Schuster and F. Stumpf \"A new security architecture for smartcards utilizing PUFs \" in Information Security Solutions Europe (ISSE) 2012.","DOI":"10.1007\/978-3-658-00333-3_18"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502786"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_1"},{"volume-title":"New York Inc.","year":"2011","author":"Ruhrmair U.","key":"e_1_3_2_1_10_1"},{"volume-title":"Katholieke Universiteit Leuven","year":"2012","author":"Maes R.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"523","volume-title":"Eds.","volume":"3027","author":"Dodis Y.","year":"2004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"e_1_3_2_1_14_1","unstructured":"M. Bossert Channel Coding for Telecommunications. New York: John Wiley & Sons 1999. M. Bossert Channel Coding for Telecommunications. New York: John Wiley & Sons 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"R. Maes P. Tuyls and I. Verbauwhede \"A soft decision helper data algorithm for SRAM PUFs \" in IEEE International Symposium on Information Theory (ISIT) 2009 pp. 2101--2105. R. Maes P. Tuyls and I. Verbauwhede \"A soft decision helper data algorithm for SRAM PUFs \" in IEEE International Symposium on Information Theory (ISIT) 2009 pp. 2101--2105.","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_24"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"M. Hiller D. Merli F. Stumpf and G. Sigl \"Complementary IBS: Application specific error correction for PUFs \" in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2012 pp. 1--6. M. Hiller D. Merli F. Stumpf and G. Sigl \"Complementary IBS: Application specific error correction for PUFs \" in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2012 pp. 1--6.","DOI":"10.1109\/HST.2012.6224310"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_16"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M.-D. Yu R. Sowell A. Singh D. M'Raihi and S. Devadas \"Performance metrics and empirical results of a PUF cryptographic key generation ASIC \" in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2012 pp. 108--115. M.-D. Yu R. Sowell A. Singh D. M'Raihi and S. Devadas \"Performance metrics and empirical results of a PUF cryptographic key generation ASIC \" in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2012 pp. 108--115.","DOI":"10.1109\/HST.2012.6224329"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.895188"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"volume-title":"Massachusetts Institute of Technology","year":"2005","author":"Suh G. E.","key":"e_1_3_2_1_25_1"},{"volume-title":"Ruhr-University Bochum","year":"2008","author":"Bosch C.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.370093"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"A. Van Herrewege and I. Verbauwhede \"Tiny application-specific programmable processor for BCH decoding \" in IEEE International Symposium on System on Chip (SoC) 2012 pp. 1--4. A. Van Herrewege and I. Verbauwhede \"Tiny application-specific programmable processor for BCH decoding \" in IEEE International Symposium on System on Chip (SoC) 2012 pp. 1--4.","DOI":"10.1109\/ISSoC.2012.6376358"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Security and reliability properties of syndrome coding techniques used in puf key generation","author":"Yu M.-D.","year":"2013","journal-title":"GOMACTech Conference"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30"},{"key":"e_1_3_2_1_31_1","first-page":"374","volume-title":"Ed.","volume":"7397","author":"van Herrewege A.","year":"2012"},{"volume-title":"John Wiley & Sons","year":"2006","author":"Cover T. M.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_40"},{"volume-title":"IEEE","year":"2013","author":"Hiller M.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","first-page":"335","volume-title":"Eds.","volume":"6225","author":"Hofer M.","year":"2010"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36140-1_12"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_5"},{"volume-title":"Ulm University","year":"2011","author":"Hiller M.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"D. Merli D. Schuster F. Stumpf and G. Sigl \"Side-channel analysis of PUFs and fuzzy extractors \"in International Conference on Trust and Trustworthy Computing (TRUST) ser. LNCS J. M. McCune B. Balache A. Perrig A.-R. Sadeghi A. Sasse and Y. Beres Eds. vol. 6740. Springer 2011 pp. 33--47. D. Merli D. Schuster F. Stumpf and G. Sigl \"Side-channel analysis of PUFs and fuzzy extractors \"in International Conference on Trust and Trustworthy Computing (TRUST) ser. LNCS J. M. McCune B. Balache A. Perrig A.-R. Sadeghi A. Sasse and Y. Beres Eds. vol. 6740. Springer 2011 pp. 33--47.","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_9"},{"key":"e_1_3_2_1_44_1","first-page":"471","volume-title":"Ed.","volume":"4965","author":"Cramer R.","year":"2008"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096180"},{"volume-title":"Massachusetts Institute of Technology","year":"2011","author":"Chang A.","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","first-page":"312","volume-title":"Eds.","volume":"6917","author":"Bogdanov A.","year":"2011"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 3rd international workshop on Trustworthy embedded devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517300.2517304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517300.2517304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:08Z","timestamp":1750234748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517300.2517304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":47,"alternative-id":["10.1145\/2517300.2517304","10.1145\/2517300"],"URL":"https:\/\/doi.org\/10.1145\/2517300.2517304","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}