{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:04Z","timestamp":1740132004473,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"C-FAR, one of six centers of STARnet, the Semiconductor Research Corporation Program through Microelectronics Advanced Research Corporation and Defense Advanced Research Projects Agency"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1331652","CNS-0923313","CNS-0964641"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation task","doi-asserted-by":"crossref","award":["1836.074"],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/tcad.2015.2418288","type":"journal-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T11:20:25Z","timestamp":1428060025000},"page":"903-914","source":"Crossref","is-referenced-by-count":33,"title":["Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells"],"prefix":"10.1109","volume":"34","author":[{"given":"Xiaolin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Amir","family":"Rahmati","sequence":"additional","affiliation":[]},{"given":"Daniel E.","family":"Holcomb","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Wayne","family":"Burleson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2006.884077"},{"journal-title":"I OSXL450 Infrared Non-Contact Thermometer Manual","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2061810"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837372"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687515"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024769"},{"journal-title":"I Model EC1X Environmental Chamber User and Repair Manual","year":"2011","key":"ref37"},{"journal-title":"8K X 8 BIT low power CMOS SRAM","year":"2007","key":"ref36"},{"journal-title":"Texas Instruments Application Report","year":"2015","author":"inc","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2027543"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.2005814"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837451"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681593"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36140-1_12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-32946-3_27","article-title":"Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs","author":"van herrewege","year":"2012","journal-title":"Financial Cryptography Data Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224310"},{"key":"ref24","first-page":"148","article-title":"Drowsy caches: Simple techniques for reducing leakage power","author":"flautner","year":"2002","journal-title":"Proc Int Symp Comput Archit"},{"key":"ref23","first-page":"1","article-title":"Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling","author":"ransford","year":"2008","journal-title":"The USENIX Workshop on Power Aware Computing and Systems (HotPower)"},{"key":"ref26","first-page":"55","article-title":"SRAM leakage suppression by minimizing standby supply voltage","author":"qin","year":"2004","journal-title":"Proc 5th Int Symp Quality Electric Design"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093938"},{"key":"ref50","first-page":"1","article-title":"Key-recovery attacks on various RO PUF constructions via helper data manipulation","author":"delvaux","year":"2014","journal-title":"Proc Conf Design Autom Test Europe"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-642-21599-5_14","article-title":"Extracting device fingerprints from flash memory by exploiting physical variations","author":"prabhu","year":"2011","journal-title":"Proceedings of the 4th International Conference on Trust and Trustworthy Computing TRUST'11"},{"journal-title":"Predictive Technology Model","year":"2002","author":"cao","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224314"},{"article-title":"Low temperature data remanence in static RAM","year":"2002","author":"skorobogatov","key":"ref14"},{"key":"ref15","first-page":"1","article-title":"We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags","author":"saxena","year":"2009","journal-title":"Proc Conf RFID Security"},{"key":"ref16","first-page":"115","article-title":"RFID-tags for anti-counterfeiting","author":"tuyls","year":"2006","journal-title":"Topics in Cryptology—CT-RSA"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.179"},{"key":"ref19","article-title":"Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs","author":"maes","year":"2009","journal-title":"Cryptographic Hardware and Embedded Security"},{"article-title":"Physical random functions","year":"2003","author":"gassend","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref6","first-page":"278","article-title":"16.2 a 0.19 pJ\/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100% stable secure key generation in 22nm CMOS","author":"mathew","year":"2014","journal-title":"Proc IEEE Int Solid-State Circuits Conf Dig Tech Papers (ISSCC)"},{"key":"ref5","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2008.4479705"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513105"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref9","first-page":"372","article-title":"IC identification circuit using device mismatch","author":"lofstrom","year":"2000","journal-title":"Proc IEEE Int Solid-State Circuits Conf Dig Tech Papers"},{"key":"ref46","article-title":"PUFKY: A fully functional PUF-based cryptographic key generator","author":"maes","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref47","first-page":"1","article-title":"Security and reliability properties of syndrome coding techniques used in PUF key generation","author":"yu","year":"2013","journal-title":"Proc GOMAC Conf"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IWSOC.2005.78"},{"journal-title":"International Technology Roadmap for Semiconductors (ITRS)—Front End Process 2004 Update","year":"2014","author":"association","key":"ref41"},{"journal-title":"Neural Network Design","year":"1996","author":"hagan","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5456940"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/7110649\/07078918.pdf?arnumber=7078918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:47:48Z","timestamp":1641988068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7078918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":50,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2015.2418288","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2015,6]]}}}