{"id":"https://openalex.org/W3092023575","doi":"https://doi.org/10.1007/s13389-020-00247-2","title":"SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version","display_name":"SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version","publication_year":2020,"publication_date":"2020-12-24","ids":{"openalex":"https://openalex.org/W3092023575","doi":"https://doi.org/10.1007/s13389-020-00247-2","mag":"3092023575"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-020-00247-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-020-00247-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023787283","display_name":"Florian Unterstein","orcid":"https://orcid.org/0000-0002-8384-2021"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Florian Unterstein","raw_affiliation_strings":["Fraunhofer Institute for Applied and Integrated Security AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078816811","display_name":"Nisha Jacob","orcid":"https://orcid.org/0000-0002-5603-6243"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nisha Jacob","raw_affiliation_strings":["Fraunhofer Institute for Applied and Integrated Security AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048053456","display_name":"Neil Hanley","orcid":"https://orcid.org/0000-0002-2595-7648"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Neil Hanley","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), ECIT, Queen\u2019s University Belfast, Belfast, Northern Ireland","Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), ECIT, Queen\u2019s University Belfast, Belfast, Northern Ireland","institution_ids":[]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, Northern Ireland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089292929","display_name":"Chongyan Gu","orcid":"https://orcid.org/0000-0002-3028-8004"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), ECIT, Queen\u2019s University Belfast, Belfast, Northern Ireland","Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), ECIT, Queen\u2019s University Belfast, Belfast, Northern Ireland","institution_ids":[]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, Northern Ireland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107225611","display_name":"Johann Heyszl","orcid":"https://orcid.org/0000-0002-8425-3114"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Johann Heyszl","raw_affiliation_strings":["Fraunhofer Institute for Applied and Integrated Security AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023787283"],"corresponding_institution_ids":["https://openalex.org/I4210136922"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.4715,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61497251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":"3","first_page":"257","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7815413475036621},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.7628136873245239},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7530232667922974},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6518203616142273},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6283953785896301},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6230239272117615},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.5839954614639282},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5106685757637024},{"id":"https://openalex.org/keywords/pseudorandom-function-family","display_name":"Pseudorandom function family","score":0.5035521388053894},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.44050005078315735},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.33786630630493164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24058374762535095},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1009976863861084},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.07687455415725708}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7815413475036621},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7628136873245239},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7530232667922974},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6518203616142273},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6283953785896301},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6230239272117615},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.5839954614639282},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5106685757637024},{"id":"https://openalex.org/C178774983","wikidata":"https://www.wikidata.org/wiki/Q734896","display_name":"Pseudorandom function family","level":3,"score":0.5035521388053894},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.44050005078315735},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.33786630630493164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24058374762535095},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1009976863861084},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.07687455415725708}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s13389-020-00247-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-020-00247-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/4260345e-0c09-420c-a48b-451d0751ba8b","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/4260345e-0c09-420c-a48b-451d0751ba8b","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/229371734/sca.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Unterstein , F , Jacob , N , Hanley , N , Gu , C &amp; Heyszl , J 2020 , ' SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version ' , Journal of Cryptographic Engineering . https://doi.org/10.1007/s13389-020-00247-2","raw_type":"article"},{"id":"pmh:oai:fraunhofer.de:N-641731","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-641731.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Journal Article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/270575","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/270575","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"}],"best_oa_location":{"id":"doi:10.1007/s13389-020-00247-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-020-00247-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G152082041","display_name":null,"funder_award_id":"-CSIT2","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2177115845","display_name":null,"funder_award_id":"N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3131894466","display_name":null,"funder_award_id":"EP/N508664/-CSIT2","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4115941747","display_name":null,"funder_award_id":"Ministry of Education","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4525685408","display_name":null,"funder_award_id":"16KIS0629","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G4804264507","display_name":null,"funder_award_id":"EP/N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3092023575.pdf","grobid_xml":"https://content.openalex.org/works/W3092023575.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W25365497","https://openalex.org/W33713058","https://openalex.org/W57300150","https://openalex.org/W1527529076","https://openalex.org/W1544967376","https://openalex.org/W1595334710","https://openalex.org/W1902160629","https://openalex.org/W1922829621","https://openalex.org/W1952573265","https://openalex.org/W1995447946","https://openalex.org/W2000171858","https://openalex.org/W2032551902","https://openalex.org/W2061496435","https://openalex.org/W2080284304","https://openalex.org/W2093154965","https://openalex.org/W2124874986","https://openalex.org/W2127992996","https://openalex.org/W2129004891","https://openalex.org/W2155115217","https://openalex.org/W2166778460","https://openalex.org/W2175377689","https://openalex.org/W2181989096","https://openalex.org/W2199868977","https://openalex.org/W2296779301","https://openalex.org/W2301007129","https://openalex.org/W2478604032","https://openalex.org/W2499742630","https://openalex.org/W2555917385","https://openalex.org/W2613673407","https://openalex.org/W2626075395","https://openalex.org/W2739981662","https://openalex.org/W2745643874","https://openalex.org/W2745693247","https://openalex.org/W2747534894","https://openalex.org/W2766485173","https://openalex.org/W2785506110","https://openalex.org/W2790930562","https://openalex.org/W2884110449","https://openalex.org/W2898039501","https://openalex.org/W2949797438","https://openalex.org/W2951458793","https://openalex.org/W2972393244","https://openalex.org/W2991227433","https://openalex.org/W3003671886","https://openalex.org/W3013384204","https://openalex.org/W3018905343","https://openalex.org/W3194506215","https://openalex.org/W4239371705","https://openalex.org/W4367060365"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4308361275","https://openalex.org/W3034338022","https://openalex.org/W1480855568"],"abstract_inverted_index":{"Abstract":[0],"FPGA":[1,103,140,222],"system":[2],"on":[3,157,168,175],"chips":[4],"(SoCs)":[5],"are":[6,155],"ideal":[7],"computing":[8],"platforms":[9],"for":[10,110,148,245],"edge":[11],"devices":[12],"in":[13,28,38,71,142,292],"applications":[14],"which":[15,154],"require":[16],"high":[17],"performance":[18],"through":[19],"hardware":[20,35],"acceleration":[21],"and":[22,47,96,204,253,282],"updatability":[23],"due":[24],"to":[25,122,136,214,288],"long":[26],"operation":[27],"the":[29,102,107,111,124,137,158,176,206,221,225,249,262,266,276],"field.":[30],"A":[31],"secure":[32],"update":[33,123],"of":[34,106,114,130,172,195,208,248,265,275],"functionality":[36],"can":[37],"general":[39],"be":[40],"achieved":[41],"by":[42],"using":[43],"built-in":[44,108],"cryptographic":[45,59,99,125,268],"engines":[46,60],"provided":[48],"secret":[49,197,219,232],"key":[50,198,233,244],"storage.":[51],"However,":[52],"reported":[53],"examples":[54],"have":[55],"shown":[56],"that":[57,92,230],"such":[58],"may":[61],"become":[62],"insecure":[63],"against":[64],"side-channel":[65,97,170,184,263],"attacks":[66],"at":[67],"any":[68,80],"later":[69],"point":[70],"time.":[72],"This":[73],"leaves":[74],"already":[75],"deployed":[76],"systems":[77],"vulnerable":[78],"without":[79],"clear":[81],"mitigation":[82],"options.":[83],"To":[84],"solve":[85],"this,":[86],"we":[87,132],"propose":[88],"a":[89,149,161,169,180,187,201,209,216,242],"comprehensive":[90],"concept":[91,119],"uses":[93],"an":[94,134,273],"alternative":[95],"protected":[98,267],"engine":[100,126,153,269],"within":[101,220],"logic":[104],"instead":[105],"one":[109],"crucial":[112],"task":[113],"bitstream":[115],"decryption.":[116],"Remarkably":[117],"this":[118,173,228,293],"even":[120],"allows":[121],"itself.":[127],"As":[128],"proof":[129],"concept,":[131],"describe":[133],"application":[135],"Xilinx":[138],"Zynq-7020":[139],"SoC":[141],"detail.":[143],"We":[144,257],"provide":[145,258],"two":[146],"options":[147],"leakage":[150,162],"resilient":[151,163],"decryption":[152],"based":[156],"same":[159,226],"primitive,":[160],"pseudorandom":[164],"function":[165,212],"(LR-PRF).":[166],"Depending":[167],"evaluation":[171,274],"primitive":[174],"target":[177],"platform,":[178],"either":[179],"version":[181],"with":[182],"additional":[183],"countermeasures":[185],"or":[186,235],"more":[188],"efficient":[189],"variant":[190],"is":[191,237,285],"deployed.":[192],"The":[193,279],"lack":[194],"accessible":[196],"storage":[199,234],"poses":[200],"significant":[202],"challenge":[203],"requires":[205],"use":[207],"physical":[210],"unclonable":[211],"(PUF)":[213],"generate":[215],"device":[217],"intrinsic":[218],"logic.":[223],"At":[224],"time":[227],"means":[229],"manufacturer-provided":[231],"cryptography":[236],"no":[238],"longer":[239],"required;":[240],"only":[241],"public":[243],"signature":[246],"verification":[247],"first":[250],"stage":[251],"bootloader":[252],"initial":[254],"static":[255],"bitstream.":[256],"empirical":[259],"results":[260],"proving":[261],"security":[264],"as":[270,272],"well":[271],"PUF":[277],"quality.":[278],"full":[280],"design":[281],"source":[283],"code":[284],"made":[286],"available":[287],"encourage":[289],"further":[290],"research":[291],"direction.":[294]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
