{"id":"https://openalex.org/W2012327282","doi":"https://doi.org/10.1109/hst.2014.6855566","title":"Entropy loss in PUF-based key generation schemes: The repetition code pitfall","display_name":"Entropy loss in PUF-based key generation schemes: The repetition code pitfall","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2012327282","doi":"https://doi.org/10.1109/hst.2014.6855566","mag":"2012327282"},"language":"en","primary_location":{"id":"doi:10.1109/hst.2014.6855566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2014.6855566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058742837","display_name":"Patrick Koeberl","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Patrick Koeberl","raw_affiliation_strings":["Intel Labs, USA","[Intel Labs, Hillsboro, OR, USA]"],"affiliations":[{"raw_affiliation_string":"Intel Labs, USA","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"[Intel Labs, Hillsboro, OR, USA]","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100426824","display_name":"Jiangtao Li","orcid":"https://orcid.org/0000-0001-6860-6103"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiangtao Li","raw_affiliation_strings":["Intel Labs, USA","[Intel Labs, Hillsboro, OR, USA]"],"affiliations":[{"raw_affiliation_string":"Intel Labs, USA","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"[Intel Labs, Hillsboro, OR, USA]","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052422280","display_name":"Anand Prem Rajan","orcid":"https://orcid.org/0000-0001-5659-0386"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anand Rajan","raw_affiliation_strings":["Intel Labs, USA","[Intel Labs, Hillsboro, OR, USA]"],"affiliations":[{"raw_affiliation_string":"Intel Labs, USA","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"[Intel Labs, Hillsboro, OR, USA]","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031436726","display_name":"Wei Wu","orcid":"https://orcid.org/0000-0003-0401-7363"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Wu","raw_affiliation_strings":["Intel Labs, USA","[Intel Labs, Hillsboro, OR, USA]"],"affiliations":[{"raw_affiliation_string":"Intel Labs, USA","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"[Intel Labs, Hillsboro, OR, USA]","institution_ids":["https://openalex.org/I1343180700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058742837"],"corresponding_institution_ids":["https://openalex.org/I1343180700"],"apc_list":null,"apc_paid":null,"fwci":6.65235284,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.97577446,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"44","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.964900016784668,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9599000215530396,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7476985454559326},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.7173217535018921},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6397808790206909},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6291333436965942},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6190105080604553},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.48248982429504395},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.47848933935165405},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.47113746404647827},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43667250871658325},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.42463216185569763},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4026166796684265},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33904606103897095},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15607094764709473},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11614012718200684},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10204476118087769}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7476985454559326},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.7173217535018921},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6397808790206909},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6291333436965942},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6190105080604553},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.48248982429504395},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.47848933935165405},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.47113746404647827},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43667250871658325},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.42463216185569763},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4026166796684265},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33904606103897095},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15607094764709473},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11614012718200684},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10204476118087769},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hst.2014.6855566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2014.6855566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W42545666","https://openalex.org/W65483511","https://openalex.org/W1511186238","https://openalex.org/W1532483809","https://openalex.org/W1539042579","https://openalex.org/W1562669673","https://openalex.org/W1922829621","https://openalex.org/W1975166224","https://openalex.org/W1995871244","https://openalex.org/W2000171858","https://openalex.org/W2015880590","https://openalex.org/W2123482651","https://openalex.org/W2129004891","https://openalex.org/W2130351941","https://openalex.org/W2130393439","https://openalex.org/W2138474025","https://openalex.org/W2144336066","https://openalex.org/W2144418895","https://openalex.org/W2146813141","https://openalex.org/W2151759197","https://openalex.org/W2152531493","https://openalex.org/W2163619044","https://openalex.org/W2169212403","https://openalex.org/W2570008916","https://openalex.org/W2785506110","https://openalex.org/W4229976825","https://openalex.org/W6631862039","https://openalex.org/W6639112983","https://openalex.org/W6679357471"],"related_works":["https://openalex.org/W3031678826","https://openalex.org/W3209932692","https://openalex.org/W2923499815","https://openalex.org/W2110218640","https://openalex.org/W2976888033","https://openalex.org/W2150843699","https://openalex.org/W2906312651","https://openalex.org/W2971795314","https://openalex.org/W4387129757","https://openalex.org/W2971718024"],"abstract_inverted_index":{"One":[0],"of":[1,5,20,110,153,178,186],"the":[2,85,95,108,139,154,159,183],"promising":[3],"usages":[4],"Physically":[6],"Unclonable":[7],"Functions":[8],"(PUFs)":[9],"is":[10,54,88,98,116],"to":[11,40,56,166],"generate":[12],"cryptographic":[13,44],"keys":[14,195],"from":[15,46,196],"PUFs":[16,111,127],"for":[17,76,142,192],"secure":[18],"storage":[19],"key":[21,45,141],"material.":[22],"This":[23],"usage":[24],"has":[25],"attractive":[26],"properties":[27],"such":[28],"as":[29],"physical":[30],"unclonability":[31],"and":[32,94,120,189],"enhanced":[33],"resistance":[34],"against":[35],"hardware":[36,78],"attacks.":[37],"In":[38,102,147],"order":[39],"extract":[41],"a":[42,47,51,72,89,99,175],"reliable":[43],"noisy":[48],"PUF":[49,60],"response":[50],"fuzzy":[52,73,155,187],"extractor":[53,74,156],"used":[55],"convert":[57],"non-uniform":[58],"random":[59],"responses":[61],"into":[62],"nearly":[63],"uniform":[64],"randomness.":[65],"B\u00f6sch":[66],"et":[67],"al.":[68],"in":[69,138,158],"2008":[70],"proposed":[71],"suitable":[75],"efficient":[77],"implementation":[79],"using":[80],"two-stage":[81],"concatenated":[82],"codes,":[83],"where":[84],"inner":[86],"stage":[87,97],"conventional":[90],"error":[91],"correcting":[92],"code":[93,114,145],"outer":[96],"repetition":[100,113,144],"code.":[101],"this":[103],"paper":[104],"we":[105,149,173],"show":[106],"that":[107,151],"combination":[109],"with":[112,128,164],"approaches":[115],"not":[117],"without":[118],"risk":[119],"must":[121],"be":[122],"approached":[123],"carefully.":[124],"For":[125,169],"example,":[126],"min-entropy":[129],"lower":[130],"than":[131],"66%":[132],"may":[133],"yield":[134],"zero":[135],"leftover":[136],"entropy":[137,167,179],"generated":[140],"some":[143],"configurations.":[146],"addition,":[148],"find":[150],"many":[152],"designs":[157],"literature":[160],"are":[161],"too":[162],"optimistic":[163],"respect":[165],"estimation.":[168],"high":[170],"security":[171],"applications,":[172],"recommend":[174],"conservative":[176],"estimation":[177],"loss":[180],"based":[181,198],"on":[182],"theoretical":[184],"work":[185],"extractors":[188],"present":[190],"parameters":[191],"generating":[193],"128-bit":[194],"memory":[197],"PUFs.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
