{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T21:04:48Z","timestamp":1726261488881},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031622687"},{"type":"electronic","value":"9783031622694"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62269-4_41","type":"book-chapter","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T14:02:22Z","timestamp":1718892142000},"page":"630-650","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["True Random Numbers from\u00a0Pairs of\u00a0SRAM Devices"],"prefix":"10.1007","author":[{"given":"Manuel Aguilar","family":"Rios","sequence":"first","affiliation":[]},{"given":"Michael","family":"Partridge","sequence":"additional","affiliation":[]},{"given":"Saloni","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Cambou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,21]]},"reference":[{"key":"41_CR1","doi-asserted-by":"publisher","first-page":"39794","DOI":"10.1109\/ACCESS.2019.2907079","volume":"7","author":"M Aljohani","year":"2019","unstructured":"Aljohani, M., Ahmad, I., Basheri, M., Alassafi, M.O.: Performance analysis of cryptographic pseudorandom number generators. IEEE Access 7, 39794\u201339805 (2019)","journal-title":"IEEE Access"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Assiri, S., Cambou, B., Booher, D.D., Miandoab, D.G., Mohammadinodoushan, M.: Key exchange using ternary system to enhance security. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0488\u20130492. IEEE (2019)","DOI":"10.1109\/CCWC.2019.8666511"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Bassham, L., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2010-09-16 (2010)","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"B\u00f6hm, C., Hofer, M., Pribyl, W.: A microcontroller SRAM-PUF. In 2011 5th International Conference on Network and System Security, pp. 269\u2013273. IEEE (2011)","DOI":"10.1109\/ICNSS.2011.6060013"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Cambou, B.: A XOR data compiler combined with physical unclonable function for true random number generation. In: SAI Computing Conference (2017)","DOI":"10.1109\/SAI.2017.8252190"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Cambou, B.: Design of true random numbers generators with ternary physical unclonable functions. Adv. Sci. Technol. Eng. Syst. J. 3(3) (2018)","DOI":"10.25046\/aj030303"},{"issue":"1","key":"41_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/cryptography2010006","volume":"2","author":"B Cambou","year":"2018","unstructured":"Cambou, B., Flikkema, P.G., Palmer, J., Telesca, D., Philabaum, C.: Can ternary computing improve information assurance? Cryptography 2(1), 6 (2018)","journal-title":"Cryptography"},{"key":"41_CR8","unstructured":"Cambou, B.: Blockchain technology with ternary cryptography. Technical report, Northern Arizona University Flagstaff United States (2020)"},{"issue":"2","key":"41_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3390\/cryptography4020017","volume":"4","author":"B Cambou","year":"2020","unstructured":"Cambou, B., et al.: Securing additive manufacturing with blockchains and distributed physically unclonable functions. Cryptography 4(2), 17 (2020)","journal-title":"Cryptography"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Cambou, B., Orlowski, M.: PUF designed with resistive ram and ternary states. In: Proceedings of the 11th Annual Cyber and Information Security Research Conference, pp. 1\u20138 (2016)","DOI":"10.1145\/2897795.2897808"},{"issue":"1","key":"41_CR11","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/cryptography5010008","volume":"5","author":"B Cambou","year":"2021","unstructured":"Cambou, B., Telesca, D., Assiri, S., Garrett, M., Jain, S., Partridge, M.: TRNGs from pre-formed ReRAM arrays. Cryptography 5(1), 8 (2021)","journal-title":"Cryptography"},{"issue":"3","key":"41_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.25046\/aj030303","volume":"3","author":"Bertrand Francis Cambou","year":"2018","unstructured":"Bertrand Francis Cambou: Design of true random numbers generators with ternary physical unclonable functions. Adv. Sci. Technol. Eng. Syst. J. 3(3), 15\u201329 (2018)","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"issue":"4","key":"41_CR13","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.3390\/app12041785","volume":"12","author":"Bertrand Francis Cambou and Saloni Jain","year":"2022","unstructured":"Bertrand Francis Cambou and Saloni Jain: Key recovery for content protection using ternary PUFs designed with pre-formed ReRAM. Appl. Sci. 12(4), 1785 (2022)","journal-title":"Appl. Sci."},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Clark, L.T., Medapuram, S.B., Kadiyala, D.K.: SRAM circuits for true random number generation using intrinsic bit instability. In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 26(10), 2027\u20132037 (2018)","DOI":"10.1109\/TVLSI.2018.2840049"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Ferdaus, F., Talukder, B.M.S.B., Sadi, M., Rahman, M.T.: True random number generation using latency variations of commercial MRAM chips. In: 2021 22nd International Symposium on Quality Electronic Design (ISQED), pp. 510\u2013515. IEEE (2021)","DOI":"10.1109\/ISQED51717.2021.9424346"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Garg, A., Kim, T.T.: Design of SRAM PUF with improved uniformity and reliability utilizing device aging effect. In: 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1941\u20131944. IEEE (2014)","DOI":"10.1109\/ISCAS.2014.6865541"},{"key":"41_CR17","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van\u00a0Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"issue":"1","key":"41_CR18","first-page":"66","volume":"21","author":"I Goldberg","year":"1996","unstructured":"Goldberg, I., Wagner, D.: Randomness and the netscape browser. Dr Dobb\u2019s J.-Softw. Tools Prof. Programmer 21(1), 66\u201371 (1996)","journal-title":"Dr Dobb\u2019s J.-Softw. Tools Prof. Programmer"},{"key":"41_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"issue":"9","key":"41_CR20","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2008","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"41_CR21","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K., et\u00a0al.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the Conference on RFID Security, vol.\u00a07, p. 01 (2007)"},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Jain, S., Partridge, M., Cambou, B.: Noise injection techniques in cryptographic keys to enhance security of autonomous systems. In: Autonomous Systems: Sensors, Processing and Security for Ground, Air, Sea, and Space Vehicles and Infrastructure 2023, vol. 12540, pp. 97\u2013111. SPIE (2023)","DOI":"10.1117\/12.2663085"},{"key":"41_CR23","doi-asserted-by":"publisher","unstructured":"Jain, S., Wilson, T., Assiri, S., Cambou, B.: Bit error rate analysis of pre-formed ReRAM-based PUF. In: Science and Information Conference, pp. 882\u2013901. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-10467-1_54","DOI":"10.1007\/978-3-031-10467-1_54"},{"key":"41_CR24","doi-asserted-by":"crossref","unstructured":"Kiamehr, S., Golanbari, M.S., Tahoori, M.B.: Leveraging aging effect to improve SRAM-based true random number generators. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp. 882\u2013885. IEEE (2017)","DOI":"10.23919\/DATE.2017.7927111"},{"issue":"6","key":"41_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453159","volume":"54","author":"P Kietzmann","year":"2021","unstructured":"Kietzmann, P., Schmidt, T.C., W\u00e4hlisch, M.: A guideline on pseudorandom number generation (PRNG) in the IoT. ACM Comput. Surv. (CSUR) 54(6), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"41_CR26","unstructured":"Krarti, M.: Optimal design and retrofit of energy efficient buildings, communities, and urban centers. Butterworth-Heinemann (2018)"},{"key":"41_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-28368-0_20","volume-title":"Cryptography and Security: From Theory to Applications","author":"V van der Leest","year":"2012","unstructured":"van der Leest, V., van der Sluis, E., Schrijen, G.-J., Tuyls, P., Handschuh, H.: Efficient implementation of true random number generator based on SRAM PUFs. In: Naccache, D. (ed.) Cryptography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 300\u2013318. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28368-0_20"},{"issue":"10","key":"41_CR28","doi-asserted-by":"publisher","first-page":"26251","DOI":"10.3390\/s151026251","volume":"15","author":"D Li","year":"2015","unstructured":"Li, D., Zhaojun, L., Zou, X., Liu, Z.: PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks. Sensors 15(10), 26251\u201326266 (2015)","journal-title":"Sensors"},{"key":"41_CR29","doi-asserted-by":"crossref","unstructured":"Lorenz, D., Georgakos, G., Schlichtmann, U.: Aging analysis of circuit timing considering NBTI and HCI. In: 2009 15th IEEE International On-Line Testing Symposium, pp. 3\u20138. IEEE (2009)","DOI":"10.1109\/IOLTS.2009.5195975"},{"key":"41_CR30","doi-asserted-by":"crossref","unstructured":"Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: Internet of Threats? a survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182\u20138201 (2019)","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"41_CR31","doi-asserted-by":"crossref","unstructured":"Partridge, M., Jain, S., Garrett, M., Cambou, B.: Post-quantum cryptographic key distribution for autonomous systems operating in contested areas. In: Autonomous Systems: Sensors, Processing and Security for Ground, Air, Sea, and Space Vehicles and Infrastructure 2023, vol. 12540, pp. 126\u2013138. SPIE (2023)","DOI":"10.1117\/12.2663235"},{"key":"41_CR32","doi-asserted-by":"crossref","unstructured":"Rahman, M.T., Forte, D., Wang, X., Tehranipoor, M.: Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SOCs. In: 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/AsianHOST.2016.7835559"},{"key":"41_CR33","doi-asserted-by":"publisher","unstructured":"Rios, M.A., Jain, S., Cambou, B.: Design of a true random number generator based on MRAM devices. In: Science and Information Conference, pp. 1320\u20131341. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-37963-5_90","DOI":"10.1007\/978-3-031-37963-5_90"},{"key":"41_CR34","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1016\/j.protcy.2016.08.150","volume":"25","author":"L Sreekumar","year":"2016","unstructured":"Sreekumar, L., Ramesh, P.: Selection of an optimum entropy source design for a true random number generator. Procedia Technol. 25, 598\u2013605 (2016)","journal-title":"Procedia Technol."},{"key":"41_CR35","doi-asserted-by":"crossref","unstructured":"Sutar, S., Raha, A., Raghunathan, V.: D-PUF: an intrinsically reconfigurable dram PUF for device authentication in embedded systems. In: 2016 International Conference on Compliers, Architectures, and Sythesis of Embedded Systems (CASES), pp. 1\u201310. IEEE (2016)","DOI":"10.1145\/2968455.2968519"},{"key":"41_CR36","doi-asserted-by":"crossref","unstructured":"Vatajelu, E.I., Di\u00a0Natale, G., Prinetto, P.: Security primitives (PUF and TRNG) with STT-MRAM. In: 2016 IEEE 34th VLSI Test Symposium (VTS), pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/VTS.2016.7477292"},{"key":"41_CR37","unstructured":"Vigna, S.: It is high time we let go of the Mersenne twister. arXiv preprint arXiv:1910.06437 (2019)"},{"key":"41_CR38","doi-asserted-by":"crossref","unstructured":"Wang, R., Selimis, G., Maes, R., Goossens, S.: Long-term continuous assessment of SRAM PUF and source of random numbers. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 7\u201312. IEEE (2020)","DOI":"10.23919\/DATE48585.2020.9116353"},{"key":"41_CR39","doi-asserted-by":"crossref","unstructured":"Wilde, F.: Large scale characterization of SRAM on infineon XMC microcontrollers as PUF. In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, pp. 13\u201318 (2017)","DOI":"10.1145\/3031836.3031839"},{"issue":"9","key":"41_CR40","doi-asserted-by":"publisher","first-page":"2614","DOI":"10.1109\/JSSC.2019.2924094","volume":"54","author":"P-S Yeh","year":"2019","unstructured":"Yeh, P.-S., Yang, C.-A., Chang, Y.-H., Chih, Y.-D., Lin, C.-J., King, Y.-C.: Self-convergent trimming SRAM true random number generation with in-cell storage. IEEE J. Solid-State Circuits 54(9), 2614\u20132621 (2019)","journal-title":"IEEE J. Solid-State Circuits"},{"key":"41_CR41","doi-asserted-by":"crossref","unstructured":"Yoshimoto, Y., Katoh, Y., Ogasahara, S., Wei, Z., Kouno, K.:. A ReRAM-based physically unclonable function with bit error rate $$<$$ 0.5% after 10 years at 125 $$^\\circ $$ c for 40 nm embedded application. In: 2016 IEEE Symposium on VLSI Technology, pp. 1\u20132. IEEE (2016)","DOI":"10.1109\/VLSIT.2016.7573433"},{"key":"41_CR42","unstructured":"Y\u00fcksel, \u0130.E., et al.: TuRaN: true random number generation using supply voltage underscaling in SRAMs. arXiv preprint arXiv: 2211.10894 (2022)"},{"issue":"1","key":"41_CR43","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"key":"41_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, L., Fong, X., Chang, C.-H., Kong, Z.H., Roy, K.: Highly reliable memory-based physical unclonable function using spin-transfer torque MRAM. In: 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2169\u20132172. IEEE (2014)","DOI":"10.1109\/ISCAS.2014.6865598"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62269-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T14:16:33Z","timestamp":1718892993000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62269-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031622687","9783031622694"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62269-4_41","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}