{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:52Z","timestamp":1750306792784,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,9,29]],"date-time":"2013-09-29T00:00:00Z","timestamp":1380412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Walloon region WIST project MIPSs"},{"DOI":"10.13039\/501100004965","name":"Sixth Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004965","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,9,29]]},"DOI":"10.1145\/2527317.2527322","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T12:55:22Z","timestamp":1383137722000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Strong PUFs and their (physical) unpredictability"],"prefix":"10.1145","author":[{"given":"Michal","family":"Parusi\u0144ski","sequence":"first","affiliation":[{"name":"Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Saloomeh","family":"Shariati","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Dina","family":"Kamel","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Fran\u00e7ois","family":"Xavier-Standaert","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2013,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.10"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0041-3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/436475a"},{"issue":"3","key":"e_1_3_2_1_13_1","first-page":"125","article-title":"How to strongly link data and its medium: the paper case. Information Security","volume":"4","author":"Bulens Philippe","year":"2010","unstructured":"Philippe Bulens , Fran\u00e7ois-Xavier Standaert , and Jean-Jacques Quisquater . How to strongly link data and its medium: the paper case. Information Security , IET , 4 ( 3 ): 125 -- 136 , september 2010 . Philippe Bulens, Fran\u00e7ois-Xavier Standaert, and Jean-Jacques Quisquater. How to strongly link data and its medium: the paper case. Information Security, IET, 4(3):125--136, september 2010.","journal-title":"IET"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988797"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120680.1120685"},{"key":"e_1_3_2_1_16_1","first-page":"27","volume-title":"Philippe Antoine. Random Profiles of Laser Marks. Proceedings of the 31th symposium on Information Theory in the Benelux","author":"Shariati Saloomeh","year":"2010","unstructured":"Saloomeh Shariati , Fran\u00e7ois-Xavier Standaert , Laurent Jacques , Benoit Macq , Mohamad Amine Salhi , and Philippe Antoine. Random Profiles of Laser Marks. Proceedings of the 31th symposium on Information Theory in the Benelux , pages 27 -- 34 , 5 2010 . Saloomeh Shariati, Fran\u00e7ois-Xavier Standaert, Laurent Jacques, Benoit Macq, Mohamad Amine Salhi, and Philippe Antoine. Random Profiles of Laser Marks. Proceedings of the 31th symposium on Information Theory in the Benelux, pages 27--34, 5 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652420"},{"key":"e_1_3_2_1_18_1","volume-title":"Secure Key Storage and Anti-Counterfeiting","author":"Tuyls Pim","year":"2007","unstructured":"Pim Tuyls , Boris Skoric , and Tom Kevenaar , editors. Security with Noisy Data --- On Private Biometrics , Secure Key Storage and Anti-Counterfeiting . Springer Berlin\/Heidelberg , April 2007 . Pim Tuyls, Boris Skoric, and Tom Kevenaar, editors. Security with Noisy Data --- On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer Berlin\/Heidelberg, April 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.12"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32805-3_3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Pim\n      Tuyls\n     and \n      Boris\n      Skoric\n    .\n  Secret key generation from classical physics: Physical uncloneable functions\n  . In Satyen Mukherjee RonaldM. Aarts Raf Roovers Frans Widdershoven and Martin Ouwerkerk editors AmIware Hardware Technology Drivers of Ambient Intelligence volume \n  5\n   of \n  Philips Research pages \n  421\n  --\n  447\n  . \n  Springer Netherlands 2006\n  .  Pim Tuyls and Boris Skoric. Secret key generation from classical physics: Physical uncloneable functions. In Satyen Mukherjee RonaldM. Aarts Raf Roovers Frans Widdershoven and Martin Ouwerkerk editors AmIware Hardware Technology Drivers of Ambient Intelligence volume 5 of Philips Research pages 421--447. Springer Netherlands 2006.","DOI":"10.1007\/1-4020-4198-5_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_40"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v16:11"},{"key":"e_1_3_2_1_24_1","volume-title":"Puf modeling attacks on simulated and silicon data. IACR Cryptology ePrint Archive","author":"R\u00fchrmair Ulrich","year":"2013","unstructured":"Ulrich R\u00fchrmair , Jan S\u00f6lter , Frank Sehnke , Xiaolin Xu , Ahmed Mahmoud , Vera Stoyanova , Gideon Dror , J\u00fcrgen Schmidhuber , Wayne Burleson , and Srinivas Devadas . Puf modeling attacks on simulated and silicon data. IACR Cryptology ePrint Archive , 2013 :112, 2013. Ulrich R\u00fchrmair, Jan S\u00f6lter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, J\u00fcrgen Schmidhuber, Wayne Burleson, and Srinivas Devadas. Puf modeling attacks on simulated and silicon data. IACR Cryptology ePrint Archive, 2013:112, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008695"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2010.5619757"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881511.1881544"},{"key":"e_1_3_2_1_29_1","volume-title":"Glitch puf: Extracting information from usually unwanted glitches. IEICE Transactions, 95-A(1):223--233","author":"Shimizu Koichi","year":"2012","unstructured":"Koichi Shimizu , Daisuke Suzuki , and Tomomi Kasuya . Glitch puf: Extracting information from usually unwanted glitches. IEICE Transactions, 95-A(1):223--233 , 2012 . Koichi Shimizu, Daisuke Suzuki, and Tomomi Kasuya. Glitch puf: Extracting information from usually unwanted glitches. IEICE Transactions, 95-A(1):223--233, 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_22"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2009.5118023"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1167704.1167712"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2006057"},{"key":"e_1_3_2_1_34_1","first-page":"424","volume-title":"VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on","author":"Wang Zheng-Yu","year":"2004","unstructured":"Zheng-Yu Wang , Hui Pan , Chung-Ming Chang , Hai-Rong Yu , and M. F. Chang . A 600 msps 8-bit folding adc in 0.18\/spl mu\/m cmos . In VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on , pages 424 -- 427 , 2004 . Zheng-Yu Wang, Hui Pan, Chung-Ming Chang, Hai-Rong Yu, and M. F. Chang. A 600 msps 8-bit folding adc in 0.18\/spl mu\/m cmos. In VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on, pages 424--427, 2004."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2013.2237672"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044961"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"e_1_3_2_1_39_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33027-8","volume-title":"Leuven","author":"Prouff Emmanuel","year":"2012","unstructured":"Emmanuel Prouff and Patrick Schaumont , editors. Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop , Leuven , Belgium, September 9-12, 2012 . Proceedings, volume 7428 of Lecture Notes in Computer Science . Springer , 2012. Emmanuel Prouff and Patrick Schaumont, editors. Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, volume 7428 of Lecture Notes in Computer Science. Springer, 2012."}],"event":{"name":"ESWEEK'13: Ninth Embedded System Week","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CS"],"location":"Montreal Quebec Canada","acronym":"ESWEEK'13"},"container-title":["Proceedings of the Workshop on Embedded Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2527317.2527322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2527317.2527322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:29Z","timestamp":1750232069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2527317.2527322"}},"subtitle":["a case study with power PUFs"],"short-title":[],"issued":{"date-parts":[[2013,9,29]]},"references-count":38,"alternative-id":["10.1145\/2527317.2527322","10.1145\/2527317"],"URL":"https:\/\/doi.org\/10.1145\/2527317.2527322","relation":{},"subject":[],"published":{"date-parts":[[2013,9,29]]},"assertion":[{"value":"2013-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}