{"id":"https://openalex.org/W2083322481","doi":"https://doi.org/10.1109/fpl.2012.6339209","title":"FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence","display_name":"FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2083322481","doi":"https://doi.org/10.1109/fpl.2012.6339209","mag":"2083322481"},"language":"en","primary_location":{"id":"doi:10.1109/fpl.2012.6339209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpl.2012.6339209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"22nd International Conference on Field Programmable Logic and Applications (FPL)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047852609","display_name":"Swetha Pappala","orcid":null},"institutions":[{"id":"https://openalex.org/I90871651","display_name":"University of Toledo","ror":"https://ror.org/01pbdzh19","country_code":"US","type":"education","lineage":["https://openalex.org/I90871651"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Swetha Pappala","raw_affiliation_strings":["EECS, University of Tolctlo and E\u00f6tv\u00f6s L\u00e1rand University, USA","[EECS, University of Toledo, USA]"],"affiliations":[{"raw_affiliation_string":"EECS, University of Tolctlo and E\u00f6tv\u00f6s L\u00e1rand University, USA","institution_ids":[]},{"raw_affiliation_string":"[EECS, University of Toledo, USA]","institution_ids":["https://openalex.org/I90871651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014613583","display_name":"Mohammed Niamat","orcid":"https://orcid.org/0000-0002-1896-1569"},"institutions":[{"id":"https://openalex.org/I90871651","display_name":"University of Toledo","ror":"https://ror.org/01pbdzh19","country_code":"US","type":"education","lineage":["https://openalex.org/I90871651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Niamat","raw_affiliation_strings":["EECS, University of Tolctlo and E\u00f6tv\u00f6s L\u00e1rand University, USA","[EECS, University of Toledo, USA]"],"affiliations":[{"raw_affiliation_string":"EECS, University of Tolctlo and E\u00f6tv\u00f6s L\u00e1rand University, USA","institution_ids":[]},{"raw_affiliation_string":"[EECS, University of Toledo, USA]","institution_ids":["https://openalex.org/I90871651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081295439","display_name":"Weiqing Sun","orcid":"https://orcid.org/0000-0003-4666-397X"},"institutions":[{"id":"https://openalex.org/I90871651","display_name":"University of Toledo","ror":"https://ror.org/01pbdzh19","country_code":"US","type":"education","lineage":["https://openalex.org/I90871651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weiqing Sun","raw_affiliation_strings":["EECS, University of Tolctlo and E\u00f6tv\u00f6s L\u00e1rand University, USA","[ET, University of Toledo, USA]"],"affiliations":[{"raw_affiliation_string":"EECS, University of Tolctlo and E\u00f6tv\u00f6s L\u00e1rand University, USA","institution_ids":[]},{"raw_affiliation_string":"[ET, University of Toledo, USA]","institution_ids":["https://openalex.org/I90871651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047852609"],"corresponding_institution_ids":["https://openalex.org/I90871651"],"apc_list":null,"apc_paid":null,"fwci":0.8702,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74114671,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"388","last_page":"393"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8659635782241821},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6990516185760498},{"id":"https://openalex.org/keywords/bch-code","display_name":"BCH code","score":0.6840329766273499},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6506062150001526},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5835315585136414},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.5648062825202942},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5442569255828857},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.4983229637145996},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.483849436044693},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.4260818362236023},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4108160734176636},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3937303125858307},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3372248709201813},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3357056975364685},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.25323760509490967},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.2430819272994995},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16457846760749817},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.13825955986976624}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8659635782241821},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6990516185760498},{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.6840329766273499},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6506062150001526},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5835315585136414},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.5648062825202942},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5442569255828857},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.4983229637145996},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.483849436044693},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.4260818362236023},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4108160734176636},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3937303125858307},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3372248709201813},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3357056975364685},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25323760509490967},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.2430819272994995},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16457846760749817},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.13825955986976624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fpl.2012.6339209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpl.2012.6339209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"22nd International Conference on Field Programmable Logic and Applications (FPL)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W42037993","https://openalex.org/W1543659671","https://openalex.org/W1607844737","https://openalex.org/W1876179543","https://openalex.org/W2083774801","https://openalex.org/W2084106057","https://openalex.org/W2088630761","https://openalex.org/W2095425517","https://openalex.org/W2112995947","https://openalex.org/W2116374153","https://openalex.org/W2129004891","https://openalex.org/W2148330234","https://openalex.org/W2161350468","https://openalex.org/W2164595519","https://openalex.org/W2168174386","https://openalex.org/W3145722221","https://openalex.org/W6636116064","https://openalex.org/W6683684548","https://openalex.org/W6684809047"],"related_works":["https://openalex.org/W2943247777","https://openalex.org/W1487439089","https://openalex.org/W2740543340","https://openalex.org/W2371167013","https://openalex.org/W1493958394","https://openalex.org/W1582340598","https://openalex.org/W2794545997","https://openalex.org/W2584980534","https://openalex.org/W2182731056","https://openalex.org/W1600949677"],"abstract_inverted_index":{"The":[0,56,98,119],"threat":[1],"of":[2,7,22,52,59,64,69,77,81,90,121,136],"digital":[3],"counterfeiting":[4],"and":[5,84,108,117],"forgery":[6],"integrated":[8,23],"circuits":[9,24],"is":[10,101,124,130],"growing":[11],"at":[12],"an":[13,48],"alarming":[14],"rate.":[15],"At":[16],"the":[17,20,60,67,78,82,85,109,113,122,134,137,147],"same":[18],"time,":[19],"functionalities":[21],"are":[25,115],"becoming":[26],"much":[27],"more":[28],"complex.":[29],"This":[30],"paper":[31],"presents":[32],"a":[33],"design":[34,100],"for":[35,66,112],"cryptographic":[36],"applications":[37],"using":[38,94],"Physically":[39],"Unclonable":[40],"Functions":[41],"(PUFs)":[42],"that":[43,133],"can":[44],"be":[45,127,143],"implemented":[46,102],"on":[47,103],"FPGA":[49,83],"taking":[50,75],"advantage":[51,76],"its":[53],"unique":[54,79],"architecture.":[55],"first":[57],"part":[58,87],"research":[61],"involves":[62,88],"development":[63,89],"techniques":[65],"generation":[68],"uniquely":[70],"distinguishable":[71],"responses":[72,114,123],"from":[73],"ROPUFs":[74],"architecture":[80],"latter":[86],"error":[91],"correction":[92],"technique":[93],"Artificial":[95],"Neural":[96],"Networks.":[97],"proposed":[99,138],"several":[104],"Xilinx":[105],"Spartan":[106],"FPGAs":[107],"Hamming":[110],"distances":[111],"computed":[116],"analyzed.":[118],"uniqueness":[120],"found":[125,132],"to":[126,142],"49.0625%.":[128],"It":[129],"also":[131,140],"results":[135],"ECC":[139],"prove":[141],"computationally":[144],"efficient":[145],"than":[146],"conventional":[148],"BCH":[149],"codes.":[150]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
