{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T16:08:27Z","timestamp":1770566907944,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T00:00:00Z","timestamp":1463529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006445","name":"National Science Foundation","doi-asserted-by":"publisher","award":["HRD #1102005"],"award-info":[{"award-number":["HRD #1102005"]}],"id":[{"id":"10.13039\/100006445","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,18]]},"DOI":"10.1145\/2902961.2903044","type":"proceedings-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T18:21:10Z","timestamp":1463163670000},"page":"317-322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Survey of Emerging Technology Based Physical Unclonable Funtions"],"prefix":"10.1145","author":[{"given":"Ilia A.","family":"Bautista Adames","sequence":"first","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Jayita","family":"Das","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Sanjukta","family":"Bhanja","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"J. Das K. Scott and S. Bhanja. Mram puf: A novel geometry based magnetic puf with integrated cmos. Emerging Technologies in Computing Systems Submitted for 2016 publication. J. Das K. Scott and S. Bhanja. Mram puf: A novel geometry based magnetic puf with integrated cmos. Emerging Technologies in Computing Systems Submitted for 2016 publication.","DOI":"10.1145\/2854154"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"436","article-title":"Mram puf: Using geometric and resistive variations in mram cells. Nanotechnology","volume":"14","author":"Das J.","unstructured":"J. Das , K. Scott , S. Rajaram , D. Burgett , and S. Bhanja . Mram puf: Using geometric and resistive variations in mram cells. Nanotechnology , IEEE Transactions on , 14 ( 3 ): 436 -\"443, 2015. J. Das, K. Scott, S. Rajaram, D. Burgett, and S. Bhanja. Mram puf: Using geometric and resistive variations in mram cells. Nanotechnology, IEEE Transactions on, 14(3):436-\"443, 2015.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_3_1","volume-title":"Memristive crypto primitive for building highly secure physical unclonable functions. Scientific reports, 5","author":"Gao Y.","year":"2015","unstructured":"Y. Gao , D. C. Ranasinghe , S. F. Al-Sarawi , O. Kavehei , and D. Abbott . Memristive crypto primitive for building highly secure physical unclonable functions. Scientific reports, 5 , 2015 . Y. Gao, D. C. Ranasinghe, S. F. Al-Sarawi, O. Kavehei, and D. Abbott. Memristive crypto primitive for building highly secure physical unclonable functions. Scientific reports, 5, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952593"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-319-16214-0_17","volume-title":"Applied Reconfigurable Computing","author":"Habib B.","year":"2015","unstructured":"B. Habib , J.-P. Kaps , and K. Gaj . Efficient sr-latch puf . In Applied Reconfigurable Computing , pages 205 -- 216 . Springer , 2015 . B. Habib, J.-P. Kaps, and K. Gaj. Efficient sr-latch puf. In Applied Reconfigurable Computing, pages 205--216. Springer, 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Conference on RFID Security","volume":"7","author":"Holcomb D. E.","year":"2007","unstructured":"D. E. Holcomb , W. P. Burleson , K. Fu , Initial sram state as a fingerprint and source of true random numbers for rfid tags . In Proceedings of the Conference on RFID Security , volume 7 , 2007 . D. E. Holcomb, W. P. Burleson, K. Fu, et al. Initial sram state as a fingerprint and source of true random numbers for rfid tags. In Proceedings of the Conference on RFID Security, volume 7, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2015.7085443"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2014.6742869"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"e_1_3_2_1_12_1","volume-title":"3rd Benelux workshop on information and system security (WISSec 2008","volume":"17","author":"Maes R.","year":"2008","unstructured":"R. Maes , P. Tuyls , and I. Verbauwhede . Intrinsic pufs from flip-flops on reconfigurable devices . In 3rd Benelux workshop on information and system security (WISSec 2008 ), volume 17 , 2008 . R. Maes, P. Tuyls, and I. Verbauwhede. Intrinsic pufs from flip-flops on reconfigurable devices. In 3rd Benelux workshop on information and system security (WISSec 2008), volume 17, 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225055"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2387353"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2012.40"},{"key":"e_1_3_2_1_16_1","volume-title":"Using quantum confinement to uniquely identify devices. Scientific reports, 5","author":"Roberts J.","year":"2015","unstructured":"J. Roberts , I. E. Bagci , M. Zawawi , J. Sexton , N. Hulbert , Y. Noori , M. Young , C. Woodhead , M. Missous , M. Migliorato , Using quantum confinement to uniquely identify devices. Scientific reports, 5 , 2015 . J. Roberts, I. E. Bagci, M. Zawawi, J. Sexton, N. Hulbert, Y. Noori, M. Young, C. Woodhead, M. Missous, M. Migliorato, et al. Using quantum confinement to uniquely identify devices. Scientific reports, 5, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744892"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_21_1","first-page":"366","volume-title":"CHES 2010","author":"Suzuki D.","year":"2010","unstructured":"D. Suzuki and K. Shimizu . The glitch puf: A new delay-puf architecture exploiting glitch shapes. In Cryptographic Hardware and Embedded Systems , CHES 2010 , pages 366 -- 382 . Springer , 2010 . D. Suzuki and K. Shimizu. The glitch puf: A new delay-puf architecture exploiting glitch shapes. In Cryptographic Hardware and Embedded Systems, CHES 2010, pages 366--382. Springer, 2010."},{"key":"e_1_3_2_1_22_1","volume-title":"Radioengineering","author":"Wu Q.","year":"2012","unstructured":"Q. Wu , J. Zhang , Y. Lin , and W. Che . Watermarking fpga bitfile for intellectual property protection . Radioengineering , 2012 . Q. Wu, J. Zhang, Y. Lin, and W. Che. Watermarking fpga bitfile for intellectual property protection. Radioengineering, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2485288.2485388"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865598"},{"issue":"8","key":"e_1_3_2_1_25_1","first-page":"1630","article-title":"Highly reliable spin-transfer torque magnetic ram-based physical unclonable function with multi-response-bits per cell. Information Forensics and Security","volume":"10","author":"Zhang L.","year":"2015","unstructured":"L. Zhang , X. Fong , C.-H. Chang , Z. H. Kong , and K. Roy . Highly reliable spin-transfer torque magnetic ram-based physical unclonable function with multi-response-bits per cell. Information Forensics and Security , IEEE Transactions on , 10 ( 8 ): 1630 -- 1642 , 2015 . L. Zhang, X. Fong, C.-H. Chang, Z. H. Kong, and K. Roy. Highly reliable spin-transfer torque magnetic ram-based physical unclonable function with multi-response-bits per cell. Information Forensics and Security, IEEE Transactions on, 10(8):1630--1642, 2015.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2315743"}],"event":{"name":"GLSVLSI '16: Great Lakes Symposium on VLSI 2016","location":"Boston Massachusetts USA","acronym":"GLSVLSI '16","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEEE CASS"]},"container-title":["Proceedings of the 26th edition on Great Lakes Symposium on VLSI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2902961.2903044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2902961.2903044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:04Z","timestamp":1750221544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2902961.2903044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,18]]},"references-count":25,"alternative-id":["10.1145\/2902961.2903044","10.1145\/2902961"],"URL":"https:\/\/doi.org\/10.1145\/2902961.2903044","relation":{},"subject":[],"published":{"date-parts":[[2016,5,18]]},"assertion":[{"value":"2016-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}