{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:45:16Z","timestamp":1760237116987,"version":"build-2065373602"},"reference-count":69,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T00:00:00Z","timestamp":1582588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001655","name":"Deutscher Akademischer Austauschdienst","doi-asserted-by":"publisher","award":["57214224"],"award-info":[{"award-number":["57214224"]}],"id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>New large classes of permutations over      \u2124   2 n        based on T-Functions as Self-Inverting Permutation Functions (SIPFs) are presented. The presented classes exhibit negligible or low complexity when implemented in emerging FPGA technologies. The target use of such functions is in creating the so called Secret Unknown Ciphers (SUC) to serve as resilient Clone-Resistant structures in smart non-volatile Field Programmable Gate Arrays (FPGA) devices. SUCs concepts were proposed a decade ago as digital consistent alternatives to the conventional analog inconsistent Physical Unclonable Functions PUFs. The proposed permutation classes are designed and optimized particularly to use non-consumed Mathblock cores in programmable System-on-Chip (SoC) FPGA devices. Hardware and software complexities for realizing such structures are optimized and evaluated for a sample expected target FPGA technology. The attained security levels of the resulting SUCs are evaluated and shown to be scalable and usable even for post-quantum crypto systems.<\/jats:p>","DOI":"10.3390\/cryptography4010006","type":"journal-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T08:12:22Z","timestamp":1582618342000},"page":"6","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-5270","authenticated-orcid":false,"given":"Saleh","family":"Mulhem","sequence":"first","affiliation":[{"name":"Institute of Computer and Network Engineering, Technische Universit\u00e4t Braunschweig, 38106 Braunschweig, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7478-1255","authenticated-orcid":false,"given":"Ayoub","family":"Mars","sequence":"additional","affiliation":[{"name":"Institute of Computer and Network Engineering, Technische Universit\u00e4t Braunschweig, 38106 Braunschweig, Germany"}]},{"given":"Wael","family":"Adi","sequence":"additional","affiliation":[{"name":"Institute of Computer and Network Engineering, Technische Universit\u00e4t Braunschweig, 38106 Braunschweig, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,25]]},"reference":[{"key":"ref_1","first-page":"1361","article-title":"A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions","volume":"14","author":"Kim","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2818186","article-title":"A Survey on Lightweight Entity Authentication with Strong PUFs","volume":"48","author":"Delvaux","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"ref_3","unstructured":"Skorobogatov, S. (2019, December 20). Semi-Invasive Attacks: A New Approach to Hardware Security Analysis. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.228.2204&rep=rep1&type=pdf."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., and Tuyls, P. (2007). FPGA Intrinsic PUFs and Their Use for IP Protection. Cryptographic Hardware and Embedded Systems\u2014CHES 2007, Springer.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Adi, W., Ouertani, N., Hanoun, A., and Soudan, B. (2009, January 5\u20138). Deploying FPGA self-configurable cell structure for micro crypto-functions. Proceedings of the 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia.","DOI":"10.1109\/ISCC.2009.5202368"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Mulhem, S., and Adi, W. (2019). New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices. Cryptography, 3.","DOI":"10.3390\/cryptography3040028"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Babaei, A., and Schiele, G. (2019). Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors, 19.","DOI":"10.3390\/s19143208"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Maes, R., and Verbauwhede, I. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions, Springer.","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical One-Way Functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002, January 9\u201313). Controlled physical random functions. Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA.","DOI":"10.1145\/586110.586132"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Adi, W. (2009, January 20\u201321). Autonomous Physical Secret Functions and Clone-Resistant Identification. Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security;, Edinburgh, UK.","DOI":"10.1109\/BLISS.2009.16"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002, January 18\u201322). Silicon physical random functions. Proceedings of the 9th ACM conference on Computer and communications security\u2014CCS \u201902;, Washington, DC, USA.","DOI":"10.1145\/586131.586132"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TCAD.2017.2702607","article-title":"Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF","volume":"37","author":"Marchand","year":"2018","journal-title":"IEEE Trans. Comput. Des. Integr. Circuits Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"Daihyun","year":"2005","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Go\u0142ofit, K., and Wieczorek, P. (2019). Chaos-Based Physical Unclonable Functions. Appl. Sci., 9.","DOI":"10.3390\/app9050991"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Santiago, L., Patil, V.C., Prado, C.B., Alves, T.A.O., Marzulo, L.A.J., Franca, F.M.G., and Kundu, S. (2019, January 2\u201310). Realizing strong PUF from weak PUF via neural computing. Proceedings of the 2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Delft, The Netherlands.","DOI":"10.1109\/DFT.2017.8244433"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s41635-019-00071-z","article-title":"Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network","volume":"3","author":"Patil","year":"2019","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"64778","DOI":"10.1109\/ACCESS.2019.2917259","article-title":"A Lightweight LFSR-Based Strong Physical Unclonable Function Design on FPGA","volume":"7","author":"Hou","year":"2019","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bhargava, M., and Mai, K. (2014, January 24\u201328). An efficient reliable PUF-based cryptographic key generator in 65nm CMOS. Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.7873\/DATE2014.083"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xi, X., and Orshansky, M. (2019, December 20). Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks. Available online: https:\/\/arxiv.org\/pdf\/1909.13441.pdf.","DOI":"10.1109\/HOST45689.2020.9300270"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM J. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and J\u00fcrgen, S. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM conference on Computer and communications security\u2014CCS \u201910, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., and Naccache, D. (2010). Strong PUFs: Models, Constructions, and Security Proofs. Towards Hardware-Intrinsic Security. Information Security and Cryptography, Springer.","DOI":"10.1007\/978-3-642-14452-3"},{"key":"ref_24","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., and Sehnke, F. (2019, December 20). On the Foundations of Physical Unclonable Functions. Available online: http:\/\/www.crypto.rub.de\/imperia\/md\/crypto\/kiltz\/ulrich_paper_40.pdf."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","article-title":"PUF Modeling Attacks on Simulated and Silicon Data","volume":"8","author":"Ruhrmair","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_26","unstructured":"Sadeghi, A., Visconti, I., and Wachsmann, C. (2019, December 20). PUF-Enhanced RFID Security and Privacy. Available online: https:\/\/www.researchgate.net\/profile\/Ivan_Visconti\/publication\/265986050_PUF-enhanced_RFID_security_and_privacy\/links\/5723720208ae262228aa6ad3\/PUF-enhanced-RFID-security-and-privacy.pdf."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Calhoun, J., Minwalla, C., Helmich, C., Saqib, F., Che, W., and Plusquellic, J. (2019). Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash). Cryptography, 3.","DOI":"10.3390\/cryptography3030018"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhu, F., Li, P., Xu, H., and Wang, R. (2019). A Lightweight RFID Mutual Authentication Protocol with PUF. Sensors, 19.","DOI":"10.3390\/s19132957"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Fyrbiak, M., Kison, C., Jeske, M., and Adi, W. (2013, January 24\u201327). Combined HW-SW adaptive clone-resistant functions as physical security anchors. Proceedings of the 2013 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS-2013), Torino, Italy.","DOI":"10.1109\/AHS.2013.6604236"},{"key":"ref_30","unstructured":"Mars, A., and Adi, W. (2019). Digitally Mutating NV-FPGAs into Physically Clone-Resistant Units. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mars, A., and Adi, W. (2019). New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. Cryptography, 3.","DOI":"10.3390\/cryptography3020011"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Mars, A., Adi, W., Mulhem, S., and Hamadaqa, E. (2017, January 6\u20138). Random stream cipher as a PUF-like identity in FPGA environment. Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK.","DOI":"10.1109\/EST.2017.8090425"},{"key":"ref_33","unstructured":"Wu, J., and O\u2019Neill, M. (2019, December 20). On Foundation and Construction of Physical Unclonable Functions. Available online: https:\/\/eprint.iacr.org\/2010\/171.pdf."},{"key":"ref_34","unstructured":"(2019, September 08). SmartFusion2 SoC FPGAs. Available online: https:\/\/www.microsemi.com\/product-directory\/soc-fpgas\/1692-smartfusion2."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Adi, W., Zeitouni, S., Huang, X., Fyrbiak, M., Kison, C., Jeske, M., and Alnahhas, Z. (2013, January 7\u20139). IP-core protection for a non-volatile Self-reconfiguring SoC environment. Proceedings of the 2013 IFIP\/IEEE 21st International Conference on Very Large Scale Integration (VLSI-SoC);, Istanbul, Turkey.","DOI":"10.1109\/VLSI-SoC.2013.6673284"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Adi, W., and Soudan, B. (2007, January 9\u201310). Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. Proceedings of the ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, Edinburgh, UK.","DOI":"10.1109\/BLISS.2007.31"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Mulhem, S., Mohammad, M., and Adi, W. (2019, January 20\u201324). A New Low-Complexity Cipher Class for Clone-Resistant Identities. Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2019.8756787"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Mulhem, S., Zarrouk, R., and Adi, W. (2018, January 6\u20139). Security and Complexity Bounds of SUC-Based Physical Identity. Proceedings of the 2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK.","DOI":"10.1109\/AHS.2018.8541484"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Adi, W., and Benkrid, K. (2010, January 15\u201318). Adaptive and evolvable hardware security architectures. Proceedings of the 2010 NASA\/ESA Conference on Adaptive Hardware and Systems, Anaheim, CA, USA.","DOI":"10.1109\/AHS.2010.5546261"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Adi, W., and Benkrid, K. (2010, January 15\u201318). Ultimate design security in self-reconfiguring non-volatile environments. Proceedings of the 2010 NASA\/ESA Conference on Adaptive Hardware and Systems, Anaheim, CA, USA.","DOI":"10.1109\/AHS.2010.5546255"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Adi, W., Mulhem, S., and Mars, A. (2017, January 12\u201314). Secured remote sensing by deploying clone-resistant Secret Unknown Ciphers. Proceedings of the 2017 IEEE International Conference on Consumer Electronics\u2014Taiwan (ICCE-TW), Taipei, Taiwan.","DOI":"10.1109\/ICCE-China.2017.7991031"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Hamadaqa, E., Mulhem, S., Mars, A., and Adi, W. (2018, January 6\u20139). Clone-Resistant Joint-Identity Technique for Securing Fleet Management Systems. Proceedings of the 2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK.","DOI":"10.1109\/AHS.2018.8541448"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Mars, A., and Adi, W. (2018, January 6\u20139). New Concept for Physically-Secured E-Coins Circulations. Proceedings of the 2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK.","DOI":"10.1109\/AHS.2018.8541493"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., and Vikkelsoe, C. (2007). PRESENT: An Ultra-Lightweight Block Cipher. Cryptographic Hardware and Embedded Systems\u2014CHES 2007, Springer.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Wu, W., and Zhang, L. (2011, January 7\u201310). LBlock: A Lightweight Block Cipher. Proceedings of the Applied Cryptography and Network Security. In Proceedings of 9th International Conference, ACNS 2011, Nerja, Spain.","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. The Design of Rijndael: AES\u2014The Advanced Encryption Standard; Springer: Berlin, Germany, 2002. ISBN 978366204, 7224.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2469","DOI":"10.1007\/s10623-018-0458-5","article-title":"Nonlinear diffusion layers","volume":"86","author":"Liu","year":"2018","journal-title":"Des. Codes Cryptogr."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1006\/ffta.2000.0282","article-title":"Permutation Polynomials Modulo 2w","volume":"7","author":"Rivest","year":"2001","journal-title":"Finite Fields Their Appl."},{"key":"ref_49","unstructured":"Singh, R.P., and Maity, S. (2019, December 20). Permutation Polynomials modulo pn. Available online: https:\/\/eprint.iacr.org\/2009\/393.pdf."},{"key":"ref_50","unstructured":"Tapia-Recillas, H. (2019, December 20). Remarks on Self-Inverse Quadratic Permutation Polynomials 2010. Available online: http:\/\/www.m-hikari.com\/ija\/ija-2010\/ija-17-20-2010\/tapiaIJA17-20-2010.pdf."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TIT.2004.839478","article-title":"Interleavers for turbo codes using permutation polynomials over integer rings","volume":"51","author":"Sun","year":"2005","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_52","unstructured":"Ryu, J., and Takeshita, O.Y. (2019, December 20). On Inverses for Quadratic Permutation Polynomials over Integer Rings. Available online: https:\/\/arxiv.xilesou.top\/pdf\/1102.2223.pdf."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TIT.2005.864442","article-title":"On quadratic inverses for quadratic permutation polynomials over integer rings","volume":"52","author":"Ryu","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_54","unstructured":"Klimov, A., and Shamir, A. (2002, January 13\u201315). A New Class of Invertible Mappings. Proceedings of the 4th International Workshop Redwood Shores, San Francisco Bay, CA, USA."},{"key":"ref_55","unstructured":"Klimov, A., and Shamir, A. (2003, January 14\u201315). Cryptographic Applications of T-Functions. Proceedings of the 10th Annual International Workshop, SAC 2003, Ottawa, ON, Canada."},{"key":"ref_56","unstructured":"Klimov, A. (2005). Applications of T-functions in Cryptography. [Ph.D. Thesis, Weizmann Institute of Science]."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1215\/S0012-7094-68-03589-8","article-title":"Counting polynomial functions $(\\mod p^n)$","volume":"35","author":"Keller","year":"1968","journal-title":"Duke Math. J."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.jnt.2003.09.009","article-title":"Polynomial functions and permutation polynomials over some finite commutative rings","volume":"105","author":"Zhang","year":"2004","journal-title":"J. Number Theory"},{"key":"ref_59","first-page":"241","article-title":"On the number counting of polynomial functions","volume":"30","author":"Jiang","year":"2010","journal-title":"J. Math. Res. Expo."},{"key":"ref_60","unstructured":"Li, S. (2019, December 20). Null Polynomials modulo m. Available online: https:\/\/arxiv.xilesou.top\/pdf\/math\/0510217.pdf."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Biryukov, A., and Shamir, A. (2001, January 6\u201310). Structural Cryptanalysis of SASAS. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria.","DOI":"10.1007\/3-540-44987-6_24"},{"key":"ref_62","unstructured":"Jakobsen, T., and Knudsen, L.R. (1997, January 20\u201322). The interpolation attack on block ciphers. Proceedings of the 4th International Workshop, FSE\u201997, Haifa, Israel."},{"key":"ref_63","unstructured":"Jakobsen, T. (1998, January 23\u201327). Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree. Proceedings of the 18th Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Lindell, Y. (2017). Pseudorandom Functions: Three Decades Later. Tutorials on the Foundations of Cryptography. Information Security and Cryptography., Springer.","DOI":"10.1007\/978-3-319-57048-8"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Standaert, F.-X., Steinberger, J., and Tischhauser, E. (2012, January 15\u201319). Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK.","DOI":"10.1007\/978-3-642-29011-4_5"},{"key":"ref_66","unstructured":"Steinberger, J. (2019, December 20). Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance,. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.449.4664&rep=rep1&type=pdf."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Lampe, R., Patarin, J., and Seurin, Y. (2012, January 2\u20136). An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China.","DOI":"10.1007\/978-3-642-34961-4_18"},{"key":"ref_68","unstructured":"Chen, S., and Steinberger, J. (2014, January 11\u201315). Tight Security Bounds for Key-Alternating Ciphers. Proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Xu, T., and Potkonjak, M. (2014, January 2\u20134). Robust and flexible FPGA-based digital PUF. Proceedings of the 2014 24th International Conference on Field Programmable Logic and Applications (FPL), Munich, Germany.","DOI":"10.1109\/FPL.2014.6927449"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/1\/6\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:01:26Z","timestamp":1760173286000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/1\/6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,25]]},"references-count":69,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["cryptography4010006"],"URL":"https:\/\/doi.org\/10.3390\/cryptography4010006","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2020,2,25]]}}}