{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:00:05Z","timestamp":1776351605069,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,24]],"date-time":"2017-01-24T00:00:00Z","timestamp":1485216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r Strategisk Forskning","doi-asserted-by":"publisher","award":["SM14-0016"],"award-info":[{"award-number":["SM14-0016"]}],"id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,24]]},"DOI":"10.1145\/3031836.3031837","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T15:18:54Z","timestamp":1487258334000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices"],"prefix":"10.1145","author":[{"given":"Sha","family":"Tao","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2017,1,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_2_1","volume-title":"Hardware security in the IoT","author":"Marena T.","year":"2016","unstructured":"T. Marena and J. Yao , \" Hardware security in the IoT ,\" 2016 . Available: http:\/\/embedded-computing.com\/articles\/hardware-security-in-the-iot\/. T. Marena and J. Yao, \"Hardware security in the IoT,\" 2016. Available: http:\/\/embedded-computing.com\/articles\/hardware-security-in-the-iot\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2445751"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"e_1_3_2_1_7_1","first-page":"256","volume-title":"Solid-State Circuits Conf.,2015","author":"Alvarez A.","unstructured":"A. Alvarez , W. Zhao , and M. Alioto , \" 15 fJ\/bit Static Physically Unclonable Functions for Secure Chip Identification with &lt;2% Native Bit Instability and 140x Inter\/Intra PUF Hamming Distance Separation in 65nm\" Int . Solid-State Circuits Conf.,2015 ,pp. 256 -- 258 . A. Alvarez, W. Zhao, and M. Alioto, \"15 fJ\/bit Static Physically Unclonable Functions for Secure Chip Identification with &lt;2% Native Bit Instability and 140x Inter\/Intra PUF Hamming Distance Separation in 65nm\" Int. Solid-State Circuits Conf.,2015,pp. 256--258."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.0292"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1840845.1840855"},{"key":"e_1_3_2_1_10_1","first-page":"39","volume-title":"Design and implementation of high quality PUF for hardware-oriented cryptography,\" in Secure System Design and Trustable Computing","author":"Zalivaka S.","year":"2016","unstructured":"S. Zalivaka , L. Zhang , V. Klybik , A. Ivaniuk , and C. Chang , \" Design and implementation of high quality PUF for hardware-oriented cryptography,\" in Secure System Design and Trustable Computing , Springer , 2016 , pp. 39 -- 81 . S. Zalivaka, L. Zhang, V. Klybik, A. Ivaniuk, and C. Chang, \"Design and implementation of high quality PUF for hardware-oriented cryptography,\" in Secure System Design and Trustable Computing, Springer, 2016, pp. 39--81."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225054"},{"key":"e_1_3_2_1_13_1","first-page":"335","article-title":"An Alternative to Error Correction for SRAM-Like PUFs","author":"Hofer M.","year":"2010","unstructured":"M. Hofer and C. Boehm , \" An Alternative to Error Correction for SRAM-Like PUFs ,\" in Cryptogr. Hardw. Embed. Syst. , 2010 , pp. 335 -- 350 . M. Hofer and C. Boehm, \"An Alternative to Error Correction for SRAM-Like PUFs,\" in Cryptogr. Hardw. Embed. Syst., 2010, pp. 335--350.","journal-title":"Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_1_14_1","first-page":"142","volume-title":"Symp. Hardware-Oriented Secur. Trust","author":"Kumar R.","year":"2011","unstructured":"R. Kumar , H. Chandrikakutty , and S. Kundu , \" On improving reliability of delay based Physically Unclonable Functions under temperature variations,\" in IEEE Int . Symp. Hardware-Oriented Secur. Trust , 2011 , pp. 142 -- 147 . R. Kumar, H. Chandrikakutty, and S. Kundu, \"On improving reliability of delay based Physically Unclonable Functions under temperature variations,\" in IEEE Int. Symp. Hardware-Oriented Secur. Trust, 2011, pp. 142--147."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2012.6378703"},{"key":"e_1_3_2_1_16_1","first-page":"101","volume-title":"Symp. Hardware-Oriented Secur. Trust","author":"Xiao K.","year":"2014","unstructured":"K. Xiao , T. Rahman , D. Forte , Y. Huang , M. Su , and M. Tehranipoor , \" Bit Selection Algorithm Suitable for High-Volume Production of SRAM-PUF,\" in Int . Symp. Hardware-Oriented Secur. Trust , 2014 , pp. 101 -- 106 . K. Xiao, T. Rahman, D. Forte, Y. Huang, M. Su, and M. Tehranipoor, \"Bit Selection Algorithm Suitable for High-Volume Production of SRAM-PUF,\" in Int. Symp. Hardware-Oriented Secur. Trust, 2014, pp. 101--106."},{"key":"e_1_3_2_1_17_1","first-page":"467","volume-title":"Symp. Qual. Electron. Des.","author":"Ganta D.","year":"2014","unstructured":"D. Ganta and L. Nazhandali , \" Circuit-level approach to improve the temperature reliability of Bi-stable PUFs,\" in IEEE Int . Symp. Qual. Electron. Des. , 2014 , pp. 467 -- 472 . D. Ganta and L. Nazhandali, \"Circuit-level approach to improve the temperature reliability of Bi-stable PUFs,\" in IEEE Int. Symp. Qual. Electron. Des., 2014, pp. 467--472."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2424955"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2398454"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.5947"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2011.82"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470891179","volume-title":"CMOS Circuit Design, Layout, and Simulation","author":"Baker R.","year":"2010","unstructured":"R. Baker , CMOS Circuit Design, Layout, and Simulation . Wiley-IEEE Press , 2010 . R. Baker, CMOS Circuit Design, Layout, and Simulation. Wiley-IEEE Press, 2010."},{"key":"e_1_3_2_1_23_1","first-page":"533","volume-title":"Autom. Conf.","author":"Zalivaka S.","year":"2016","unstructured":"S. Zalivaka , A. Puchkov , V. Klybik , A. Ivaniuk , and C. Chang , \" Multi-valued Arbiters for quality enhancement of PUF responses on FPGA implementation,\" Asia South Pacific Des . Autom. Conf. , 2016 , pp. 533 -- 538 . S. Zalivaka, A. Puchkov, V. Klybik, A. Ivaniuk, and C. Chang, \"Multi-valued Arbiters for quality enhancement of PUF responses on FPGA implementation,\" Asia South Pacific Des. Autom. Conf., 2016, pp. 533--538."}],"event":{"name":"CS2 '17: Cryptography and Security in Computing Systems","location":"Stockholm Sweden","acronym":"CS2 '17"},"container-title":["Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3031836.3031837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3031836.3031837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:13Z","timestamp":1750220653000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3031836.3031837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,24]]},"references-count":23,"alternative-id":["10.1145\/3031836.3031837","10.1145\/3031836"],"URL":"https:\/\/doi.org\/10.1145\/3031836.3031837","relation":{},"subject":[],"published":{"date-parts":[[2017,1,24]]},"assertion":[{"value":"2017-01-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}