{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:24:20Z","timestamp":1729621460499,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/ngcas.2017.66","type":"proceedings-article","created":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T16:37:37Z","timestamp":1506616657000},"page":"65-68","source":"Crossref","is-referenced-by-count":6,"title":["Partially Reconfigurable IP Protection System with Ring Oscillator Based Physically Unclonable Functions"],"prefix":"10.1109","author":[{"given":"Emrah","family":"Abtioglu","sequence":"first","affiliation":[]},{"given":"Ramazan","family":"Yeniceri","sequence":"additional","affiliation":[]},{"given":"Burak","family":"Govem","sequence":"additional","affiliation":[]},{"given":"Emre","family":"Goncu","sequence":"additional","affiliation":[]},{"given":"Mustak E.","family":"Yalcin","sequence":"additional","affiliation":[]},{"given":"Gokay","family":"Saldamli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical one-way functions","volume":"297","author":"pappu","year":"2002","journal-title":"Science"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2007 Ser Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","article-title":"Ef-ficient helper data key extractor on fpgas","volume":"5154","author":"bsch","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2008 Ser Lecture Notes in Computer Science"},{"key":"ref13","article-title":"The galois\/counter mode of operation (GCM)","author":"mcgrew","year":"2004","journal-title":"Submission to NIST"},{"journal-title":"OpenCores Project Galois Counter Mode Advanced Encryption Standard GCM-AES","year":"2010","author":"ahmad","key":"ref14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2008.4629902"},{"journal-title":"Xilinx User Guide","article-title":"Virtex-5 fpga configuration user guide","year":"2012","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E96.D.2333"},{"key":"ref5","first-page":"79","article-title":"Tackling the security issues of FPGA partial reconfiguration with physical unclonable functions","author":"hori","year":"2012","journal-title":"ERSA 2012"},{"journal-title":"Reliability enhancement of ring oscillator based physically unclonable functions","year":"2012","author":"kaya","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-005-1395-x"},{"journal-title":"VSI Alliance White Paper","article-title":"Intel-lectual property protection: Schemes, alternatives and discussion","year":"2000","key":"ref1"},{"journal-title":"Xilinx User Guide","article-title":"Partial reconfiguration user guide","year":"2012","key":"ref9"}],"event":{"name":"2017 New Generation of CAS (NGCAS)","start":{"date-parts":[[2017,9,6]]},"location":"Genova, Italy","end":{"date-parts":[[2017,9,9]]}},"container-title":["2017 New Generation of CAS (NGCAS)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8049744\/8051419\/08052270.pdf?arnumber=8052270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T22:11:29Z","timestamp":1570140689000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/8052270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":14,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ngcas.2017.66","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}