{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:21:23Z","timestamp":1729660883934,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/dtis.2015.7127361","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T16:07:41Z","timestamp":1434643661000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Supply voltage variation impact on Anderson PUF quality"],"prefix":"10.1109","author":[{"given":"Mario","family":"Barbareschi","sequence":"first","affiliation":[]},{"given":"Pierpaolo","family":"Bagnasco","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Mazzeo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","year":"2007","author":"guajardo","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1867635.1867644"},{"key":"ref12","article-title":"Intrinsic pufs from flip-flops on reconfigurable devices","volume":"17","author":"maes","year":"2008","journal-title":"3rd Benelux Workshop on Information and System Security 2008"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225054"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2014.07.100"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873557"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2011.6132673"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CADGraphics.2013.22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2013.6645555"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"ref6","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proceedings of the 44th Annual Design Automation Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/978-3-642-15031-9_25","article-title":"The glitch puf: A new delay-puf architecture exploiting glitch shapes","author":"suzuki","year":"2010","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref2","first-page":"291","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"2007","journal-title":"Usenix Security"},{"journal-title":"Physical one-way functions","year":"2001","author":"ravikanth","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2010.5419927"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2013.11"}],"event":{"name":"2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","start":{"date-parts":[[2015,4,21]]},"location":"Napoli, Italy","end":{"date-parts":[[2015,4,23]]}},"container-title":["2015 10th International Conference on Design &amp; Technology of Integrated Systems in Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7118811\/7127334\/07127361.pdf?arnumber=7127361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T10:03:42Z","timestamp":1498212222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7127361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/dtis.2015.7127361","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}