{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:41:47Z","timestamp":1730259707270,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007224","name":"Vietnam National Foundation for Science and Technology Development (NAFOSTED)","doi-asserted-by":"publisher","award":["102.02-2020.14"],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,20]]},"DOI":"10.1109\/ictc52510.2021.9621147","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T15:49:57Z","timestamp":1638892197000},"page":"805-809","source":"Crossref","is-referenced-by-count":3,"title":["Stabilizing On-chip Secure Key Generation Using RO-PUF"],"prefix":"10.1109","author":[{"given":"Van-Toan","family":"Tran","sequence":"first","affiliation":[]},{"given":"Quang-Kien","family":"Trinh","sequence":"additional","affiliation":[]},{"given":"Van-Phuc","family":"Hoang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"CMOS VLSI Design A Circuits and Systems Perspective","year":"2015","author":"weste","key":"ref10"},{"key":"ref11","first-page":"71","article-title":"The History, Status, and Future of FPGAs: Hitting a nerve with field-programmable gate arrays","volume":"18 3","author":"oskar","year":"2020","journal-title":"Queue"},{"key":"ref12","article-title":"Enhanced ID authentication scheme using FPGA-based ring oscillator PUF","author":"van-toan","year":"0","journal-title":"2019 IEEE 13th International Symposium on Embedded MulticorelMany-core Systems-on-Chip (MCSoC)"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2006","author":"william","key":"ref13"},{"key":"ref14","first-page":"889","article-title":"Helper data algorithms for PUP-based key generation: Overview and analysis","volume":"34 6","author":"jeroen","year":"2014","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"journal-title":"Security analysis of puf-based key generation and entity authentication","year":"2017","author":"jeroen","key":"ref15"},{"key":"ref16","article-title":"Cryptographic key generation from PUF data using efficient fuzzy extractors","author":"hyunho","year":"0","journal-title":"16th International Conference on Advanced Communication Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2011.6122368"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813610.006"},{"key":"ref4","first-page":"375","article-title":"Improved ring oscillator PUF: An FPGA-friendly secure primitive","volume":"24 2","author":"abhranil","year":"2011","journal-title":"Journal of Cryptology"},{"key":"ref3","article-title":"Circuit-level techniques for reliable physically uncloneable functions","author":"vignesh","year":"0","journal-title":"2009 IEEE International Workshop on Hardware-Oriented Security and Trust host"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.02.005"},{"key":"ref5","article-title":"A highly flexible ring oscillator PUF","author":"mingze","year":"0","journal-title":"Proceedings of the 51st Annual Design Automation Conference"},{"key":"ref8","article-title":"Reliable and efficient PUF-based key generation using pattern matching","author":"zdenek","year":"0","journal-title":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust"},{"key":"ref7","article-title":"Efficient helper data key extractor on FPGAs","author":"christoph","year":"2008","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref2","article-title":"Physically unclonable functions: Constructions, properties and applications","author":"roel","year":"2012","journal-title":"Belgium Katholieke Universiteit Leuven"},{"key":"ref1","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"0","journal-title":"2007 44th ACM\/IEEE Design Automation Conference"},{"key":"ref9","article-title":"PUFKY: A fully functional PUF-based cryptographic key generator","author":"roel","year":"2012","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"}],"event":{"name":"2021 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2021,10,20]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2021,10,22]]}},"container-title":["2021 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9620727\/9620211\/09621147.pdf?arnumber=9621147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:53:42Z","timestamp":1652187222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9621147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,20]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ictc52510.2021.9621147","relation":{},"subject":[],"published":{"date-parts":[[2021,10,20]]}}}