{"id":"https://openalex.org/W4404031996","doi":"https://doi.org/10.1109/icccnt61001.2024.10724123","title":"Generating Robust Cryptographic Keys using Crossover Ring Oscillator PUFs: Resilience against Machine Learning Attacks","display_name":"Generating Robust Cryptographic Keys using Crossover Ring Oscillator PUFs: Resilience against Machine Learning Attacks","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031996","doi":"https://doi.org/10.1109/icccnt61001.2024.10724123"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724123","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048128247","display_name":"Arafat Miah","orcid":null},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Arafat Miah","raw_affiliation_strings":["AUST,Department of EEE,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"AUST,Department of EEE,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102195231","display_name":"Faisal Amin","orcid":null},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Faisal Amin","raw_affiliation_strings":["AUST,Department of EEE,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"AUST,Department of EEE,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101563957","display_name":"Fakir Sharif Hossain","orcid":"https://orcid.org/0000-0002-1498-9898"},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Fakir Sharif Hossain","raw_affiliation_strings":["AUST,Department of EEE,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"AUST,Department of EEE,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048128247"],"corresponding_institution_ids":["https://openalex.org/I135564639"],"apc_list":null,"apc_paid":null,"fwci":0.5186,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65518121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9614999890327454,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7006717920303345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6926257610321045},{"id":"https://openalex.org/keywords/crossover","display_name":"Crossover","score":0.6357170343399048},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6236450672149658},{"id":"https://openalex.org/keywords/ring-oscillator","display_name":"Ring oscillator","score":0.586576521396637},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.5373031497001648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3908935785293579},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3630371391773224},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17944779992103577},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13783666491508484},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.08572167158126831},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.073240727186203},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.06876146793365479}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7006717920303345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6926257610321045},{"id":"https://openalex.org/C122507166","wikidata":"https://www.wikidata.org/wiki/Q628906","display_name":"Crossover","level":2,"score":0.6357170343399048},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6236450672149658},{"id":"https://openalex.org/C104111718","wikidata":"https://www.wikidata.org/wiki/Q2153973","display_name":"Ring oscillator","level":3,"score":0.586576521396637},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.5373031497001648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3908935785293579},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3630371391773224},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17944779992103577},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13783666491508484},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.08572167158126831},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.073240727186203},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.06876146793365479},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724123","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1985875557","https://openalex.org/W2044389004","https://openalex.org/W2067008732","https://openalex.org/W2080284304","https://openalex.org/W2123482651","https://openalex.org/W2130351941","https://openalex.org/W2603527983","https://openalex.org/W2611091143","https://openalex.org/W2805045369","https://openalex.org/W2890486122","https://openalex.org/W2914764075","https://openalex.org/W2957985992","https://openalex.org/W2969111233","https://openalex.org/W3022459587","https://openalex.org/W3161821861","https://openalex.org/W4247957650","https://openalex.org/W4285502257","https://openalex.org/W4362564225","https://openalex.org/W4385489538","https://openalex.org/W4390141816","https://openalex.org/W6676995458"],"related_works":["https://openalex.org/W2347477706","https://openalex.org/W1943663474","https://openalex.org/W4299389082","https://openalex.org/W2306830238","https://openalex.org/W2110294633","https://openalex.org/W1829715381","https://openalex.org/W2962747841","https://openalex.org/W2014162767","https://openalex.org/W2630967916","https://openalex.org/W2392589811"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,19,22,57,127],"Things":[3],"(IoT)":[4],"facilitates":[5],"internet":[6],"connectivity":[7],"for":[8,35,47],"all":[9],"electronic":[10],"devices,":[11],"providing":[12],"broad":[13],"access":[14,68],"and":[15,49,67,143],"enabling":[16],"the":[17,25,55,125,152],"sharing":[18],"vast":[20],"amounts":[21],"data":[23,39],"in":[24],"cloud.":[26],"This":[27],"data,":[28],"however,":[29],"can":[30,63],"become":[31],"a":[32,103,109],"prime":[33],"target":[34],"hackers.":[36],"To":[37],"safeguard":[38],"integrity,":[40],"various":[41],"cryptographic":[42],"methods":[43],"employing":[44],"secret":[45,81,119,129,155],"keys":[46,59,130,156],"encryption":[48],"decryption":[50],"are":[51,76],"utilized.":[52],"Nonetheless,":[53],"if":[54,93],"security":[56],"these":[58,128,161],"is":[60],"breached,":[61],"hackers":[62],"easily":[64],"acquire":[65],"them":[66],"sensitive":[69],"information.":[70],"Although":[71],"Physically":[72],"Unclonable":[73],"Functions":[74],"(PUFs)":[75],"employed":[77],"to":[78,86,160],"generate":[79],"unique":[80],"keys,":[82],"they":[83,94],"remain":[84],"vulnerable":[85],"extraction":[87],"via":[88],"machine":[89,137],"learning-based":[90],"modeling":[91,132],"attacks":[92,133],"lack":[95],"sufficient":[96],"robustness.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101],"introduce":[102],"robust":[104],"key":[105,120],"generation":[106],"approach":[107],"using":[108,134],"Crossover":[110],"Ring":[111],"Oscillator":[112],"(CRO)":[113],"PUF,":[114],"coupled":[115],"with":[116],"an":[117],"optimal":[118],"selection":[121],"strategy.":[122],"We":[123],"evaluate":[124],"resilience":[126],"against":[131],"two":[135],"prevalent":[136],"learning":[138],"algorithms:":[139],"Logistic":[140],"Regression":[141],"(LR)":[142],"Support":[144],"Vector":[145],"Machines":[146],"(SVM).":[147],"Our":[148],"findings":[149],"show":[150],"that":[151],"optimally":[153],"selected":[154],"exhibit":[157],"significant":[158],"resistance":[159],"widely":[162],"used":[163],"machine-learning":[164],"techniques.":[165]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
