{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:56:19Z","timestamp":1729630579036,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/hst.2013.6581557","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:14:00Z","timestamp":1377724440000},"page":"7-12","source":"Crossref","is-referenced-by-count":13,"title":["Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results"],"prefix":"10.1109","author":[{"given":"Stephanie","family":"Kerckhof","sequence":"first","affiliation":[]},{"given":"Francois","family":"Durvaux","sequence":"additional","affiliation":[]},{"given":"Francois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Gerard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-007-0136-8"},{"journal-title":"Semico Research Semiconductor Intellectual Property The Market Hits Its Stride","year":"2012","key":"15"},{"key":"16","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/11894063_25","article-title":"Offline hardware\/ software authentication for reconfigurable platforms","volume":"4249","author":"simpson","year":"2006","journal-title":"CHES Ser Lecture Notes in Computer Science"},{"journal-title":"Xilinx FPGA IFF Copy Protection with 1-wire R - SHA-1 Secure Memories XAPP3826","year":"2006","author":"linke","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.881948"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246725"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224313"},{"journal-title":"FPGA IFF Copy Protection Using Dallas Semiconductor\/Maxim DS2432 Secure EEPROMs XAPP780","year":"2010","author":"baetoniu","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-005-1395-x"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_23"},{"key":"7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"Of Lecture Notes in Computer Science"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2000.844203"},{"key":"5","article-title":"Benoi?t ge?rard, ste?phanie kerckhof, franc?ois koeune, and franc?ois-xavier standaert intellectual property protection for integrated systems using soft physical hash functions","volume":"40","author":"durvaux","year":"0","journal-title":"The Proceedings of WISA 2012 Lecture Notes in Computer Science"},{"key":"4","first-page":"30","author":"becker","year":"2010","journal-title":"Side-channel Based Watermarks for Integrated Circuits"},{"key":"9","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1145\/277044.277241","article-title":"Robust IP watermarking methodologies for physical design","author":"kahng","year":"1998","journal-title":"Proceedings 1998 Design and Automation Conference 35th DAC (Cat No 98CH36175) DAC"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1998.724576"}],"event":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2013,6,2]]},"location":"Austin, TX, USA","end":{"date-parts":[[2013,6,3]]}},"container-title":["2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573517\/6581554\/06581557.pdf?arnumber=6581557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:53:37Z","timestamp":1498078417000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6581557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/hst.2013.6581557","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}