{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:41Z","timestamp":1771701221796,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897808","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["PUF designed with Resistive RAM and Ternary States"],"prefix":"10.1145","author":[{"given":"Bertrand","family":"Cambou","sequence":"first","affiliation":[{"name":"Northern Arizona University, 2112 s Huffer Lane - PO Box: 5621, Flagstaff AZ 86011, 1(928)5237824"}]},{"given":"Marius","family":"Orlowski","sequence":"additional","affiliation":[{"name":"Virginia Institute of Technology, 614 Whittemore Hall, Blacksburg, VA 24061, USA, 1(540)2313297"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"763","volume":"2015","author":"Yier","journal-title":"Electronics"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Zheng Gong Marc X. Makkes; 2011; Hardware Trojan Side-Channels Based on PUF; Information Security Volume 6633 Notes in Computer Science pp 294--303. Zheng Gong Marc X. Makkes; 2011; Hardware Trojan Side-Channels Based on PUF; Information Security Volume 6633 Notes in Computer Science pp 294--303.","DOI":"10.1007\/978-3-642-21040-2_21"},{"key":"e_1_3_2_1_3_1","unstructured":"David. Naccache and Patrice. Fr\u00e9manteau; Aug. 1992; Unforgeable identification device identification device reader and method of identification; PatentUS5434917. David. Naccache and Patrice. Fr\u00e9manteau; Aug. 1992; Unforgeable identification device identification device reader and method of identification; PatentUS5434917."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Ravikanth Pappu Ben. Recht Jason Taylor and Neil Gershenfield; 20 Sept 2002; Physical one-way functions; Science. Vol 297 No5589 pp2026--2030. Ravikanth Pappu Ben. Recht Jason Taylor and Neil Gershenfield; 20 Sept 2002; Physical one-way functions; Science. Vol 297 No5589 pp2026--2030.","DOI":"10.1126\/science.1074376"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"R. Maes P. Tuyls and I. Verbauwhede \"A Soft Decision Helper Data Algorithm for SRAM PUFs \" in 2009 IEEE International Symposium on Information Theory 2009. R. Maes P. Tuyls and I. Verbauwhede \"A Soft Decision Helper Data Algorithm for SRAM PUFs \" in 2009 IEEE International Symposium on Information Theory 2009.","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517300.2517304"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Pravin Prabhu Ameen Akel Laura M. Grupp Wing-Kei S. Yu G. Edward Suh Edwin Kan and Steven Swanson; June 2011; Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations; 4th international conference on Trust and trustworthy computing. Pravin Prabhu Ameen Akel Laura M. Grupp Wing-Kei S. Yu G. Edward Suh Edwin Kan and Steven Swanson; June 2011; Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations; 4th international conference on Trust and trustworthy computing.","DOI":"10.1007\/978-3-642-21599-5_14"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_9_1","unstructured":"Todd A. Christensen John E Sheets II; Oct. 30 2012; Implementing PUF utilizing EDRAM memory cell capacitance variation; Patent No.: US 8 300 450 B2.. Todd A. Christensen John E Sheets II; Oct. 30 2012; Implementing PUF utilizing EDRAM memory cell capacitance variation; Patent No.: US 8 300 450 B2.."},{"key":"e_1_3_2_1_10_1","volume-title":"US 2015\/0071432 A1.","author":"Zhu Xiaochun","year":"2015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Elena I. Vatajelu Giorgio Di Natale Mario Barbareschi Lionel Torres Marco Indaco and Paolo Prinetto; July 2015; STT-MRAM-Based PUF Architecture exploiting Magnetic Tunnel Junction Fabrication-Induced Variability; ACM transactions. Elena I. Vatajelu Giorgio Di Natale Mario Barbareschi Lionel Torres Marco Indaco and Paolo Prinetto; July 2015; STT-MRAM-Based PUF Architecture exploiting Magnetic Tunnel Junction Fabrication-Induced Variability; ACM transactions.","DOI":"10.1109\/ISVLSI.2015.128"},{"key":"e_1_3_2_1_12_1","unstructured":"Anuj Gupta May 2005 Implementing Generic BIST for testing Kilo-Bit Memories; Master Thesis No-6030402 Deemed University Patiala India. Anuj Gupta May 2005 Implementing Generic BIST for testing Kilo-Bit Memories; Master Thesis No-6030402 Deemed University Patiala India."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Dai Yamamoto Kazuo Sakiyama Kazuo Ohto and Masahiko Itoh; 2011; Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches; CHES 2011 Lecture Notes in Computer Science Volume 6917 pp 390--406. Dai Yamamoto Kazuo Sakiyama Kazuo Ohto and Masahiko Itoh; 2011; Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches; CHES 2011 Lecture Notes in Computer Science Volume 6917 pp 390--406.","DOI":"10.1007\/978-3-642-23951-9_26"},{"key":"e_1_3_2_1_14_1","unstructured":"Bertrand Cambou; June 24 2015; Memory circuits using a blocking state; US Patent Application No: 22728483. Bertrand Cambou; June 24 2015; Memory circuits using a blocking state; US Patent Application No: 22728483."},{"key":"e_1_3_2_1_15_1","unstructured":"Bertrand. Cambou; June2 2015; ReRAM architectures for secure systems; US Patent Application No 62\/169957. Bertrand. Cambou; June2 2015; ReRAM architectures for secure systems; US Patent Application No 62\/169957."},{"key":"e_1_3_2_1_16_1","unstructured":"Bertrand Cambou Neal Burger Mourad El Baraji; May 2014; Apparatus system and method for matching patterns with an ultra-fast check engine US Patent No 8 717 794B2. Bertrand Cambou Neal Burger Mourad El Baraji; May 2014; Apparatus system and method for matching patterns with an ultra-fast check engine US Patent No 8 717 794B2."},{"key":"e_1_3_2_1_17_1","unstructured":"Bertrand. Cambou; Jul 16 2015; Multi-factor authentication using a combined secure pattern; US Patent Application No 22938751. Bertrand. Cambou; Jul 16 2015; Multi-factor authentication using a combined secure pattern; US Patent Application No 22938751."},{"key":"e_1_3_2_1_18_1","unstructured":"Christian Krutzik; Jan 2015; Solid state drive Physical Unclonable Function erase verification device and method; US Patent Application publication US 2015\/0007337 A1. Christian Krutzik; Jan 2015; Solid state drive Physical Unclonable Function erase verification device and method; US Patent Application publication US 2015\/0007337 A1."},{"key":"e_1_3_2_1_19_1","unstructured":"Dominik Merli Frederic Stumpf Georg Sigl; 2013; Protecting PUF Error Correction by Codeword Masking; IACR Cryptography e-print archive 2013: 334. Dominik Merli Frederic Stumpf Georg Sigl; 2013; Protecting PUF Error Correction by Codeword Masking; IACR Cryptography e-print archive 2013: 334."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2015.2452411"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"An Chen; 2015; Comprehensive Assessment of RRAM-based PUF for Hardware Security Applications; 978-1-4673-9894-7\/15\/IEDM IEEE. An Chen; 2015; Comprehensive Assessment of RRAM-based PUF for Hardware Security Applications; 978-1-4673-9894-7\/15\/IEDM IEEE.","DOI":"10.1109\/IEDM.2015.7409672"}],"event":{"name":"CISRC '16: 11th Annual Cyber and Information Security Research","location":"Oak Ridge TN USA","acronym":"CISRC '16","sponsor":["Oak Ridge National Laboratory"]},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897808","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":21,"alternative-id":["10.1145\/2897795.2897808","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897808","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}