{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:06:46Z","timestamp":1761102406127,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116428","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"454-459","source":"Crossref","is-referenced-by-count":20,"title":["Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations"],"prefix":"10.23919","author":[{"given":"Trevor","family":"Kroeger","sequence":"first","affiliation":[]},{"given":"Wei","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Naghmeh","family":"Karimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Combined modeling and side channel attacks on strong PUFs","author":"mahmoud","year":"2013","journal-title":"Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-662-44709-3_26"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.7873\/DATE.2015.0522"},{"key":"ref13","first-page":"287","article-title":"Active and passive side-channel attacks on delay based PUF designs","volume":"2014","author":"becker","year":"2014","journal-title":"IACR CryptologyePrint Archive"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TrustCom.2016.0064"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/DSN.2012.6263957"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/DFT.2011.49"},{"key":"ref17","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"DAC"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11766-003-0059-5"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s10462-011-9272-4"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/586110.586132"},{"key":"ref3","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"CHES"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/HST.2013.6581556"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref8","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"CCS"},{"key":"ref7","first-page":"1","article-title":"PUF modeling attacks: An introduction and overview","author":"r\u00fchrmair","year":"2014","journal-title":"DATE"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/JPROC.2014.2320516"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s10836-018-5745-6"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-642-21599-5_3","article-title":"Side-channel analysis of PUFs and fuzzy extractors","author":"merli","year":"2011","journal-title":"Trust and Trustworthy Computing"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1023\/A:1010933404324"},{"year":"2016","article-title":"HSPICE User Guide: Basic Simulation and Analysis","key":"ref22"},{"year":"0","article-title":"Nangate 45nm open cell library","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TIFS.2013.2279798"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116428.pdf?arnumber=9116428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:43:34Z","timestamp":1594680214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116428","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}