{"id":"https://openalex.org/W4312795443","doi":"https://doi.org/10.1109/iscas48785.2022.9937815","title":"XFeed PUF: A Secure and Efficient Delay-based Strong PUF Using Cross-Feed Connections","display_name":"XFeed PUF: A Secure and Efficient Delay-based Strong PUF Using Cross-Feed Connections","publication_year":2022,"publication_date":"2022-05-28","ids":{"openalex":"https://openalex.org/W4312795443","doi":"https://doi.org/10.1109/iscas48785.2022.9937815"},"language":"en","primary_location":{"id":"doi:10.1109/iscas48785.2022.9937815","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas48785.2022.9937815","pdf_url":null,"source":{"id":"https://openalex.org/S4363604393","display_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054514035","display_name":"Tarek Idriss","orcid":"https://orcid.org/0000-0003-4446-9444"},"institutions":[{"id":"https://openalex.org/I52669646","display_name":"Western Washington University","ror":"https://ror.org/05wn7r715","country_code":"US","type":"education","lineage":["https://openalex.org/I52669646"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tarek Idriss","raw_affiliation_strings":["Western Washington University,Department of Computer Science,USA","Department of Computer Science, Western Washington University, USA"],"affiliations":[{"raw_affiliation_string":"Western Washington University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I52669646"]},{"raw_affiliation_string":"Department of Computer Science, Western Washington University, USA","institution_ids":["https://openalex.org/I52669646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054172154","display_name":"Alex Gavin","orcid":"https://orcid.org/0000-0002-6868-5128"},"institutions":[{"id":"https://openalex.org/I52669646","display_name":"Western Washington University","ror":"https://ror.org/05wn7r715","country_code":"US","type":"education","lineage":["https://openalex.org/I52669646"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Gavin","raw_affiliation_strings":["Western Washington University,Department of Computer Science,USA","Department of Computer Science, Western Washington University, USA"],"affiliations":[{"raw_affiliation_string":"Western Washington University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I52669646"]},{"raw_affiliation_string":"Department of Computer Science, Western Washington University, USA","institution_ids":["https://openalex.org/I52669646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046811170","display_name":"Adrian Gabales","orcid":null},"institutions":[{"id":"https://openalex.org/I52669646","display_name":"Western Washington University","ror":"https://ror.org/05wn7r715","country_code":"US","type":"education","lineage":["https://openalex.org/I52669646"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adrian Gabales","raw_affiliation_strings":["Western Washington University,Department of Computer Science,USA","Department of Computer Science, Western Washington University, USA"],"affiliations":[{"raw_affiliation_string":"Western Washington University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I52669646"]},{"raw_affiliation_string":"Department of Computer Science, Western Washington University, USA","institution_ids":["https://openalex.org/I52669646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034819596","display_name":"Haytham Idriss","orcid":"https://orcid.org/0000-0002-2904-9137"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haytham Idriss","raw_affiliation_strings":["University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010023744","display_name":"Magdy Bayoumi","orcid":"https://orcid.org/0000-0002-0630-5273"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Magdy Bayoumi","raw_affiliation_strings":["University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA","institution_ids":["https://openalex.org/I79516672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054514035"],"corresponding_institution_ids":["https://openalex.org/I52669646"],"apc_list":null,"apc_paid":null,"fwci":2.1478,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8875502,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"461","last_page":"465"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.7795755863189697},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7534457445144653},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7114123106002808},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.7066445350646973},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5724090933799744},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5570976138114929},{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.5420348048210144},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46271559596061707},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4476258158683777},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.4370354413986206},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.32723337411880493},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2804783880710602},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2334907054901123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19069373607635498},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09528911113739014}],"concepts":[{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.7795755863189697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7534457445144653},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7114123106002808},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.7066445350646973},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5724090933799744},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5570976138114929},{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.5420348048210144},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46271559596061707},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4476258158683777},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.4370354413986206},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.32723337411880493},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2804783880710602},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2334907054901123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19069373607635498},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09528911113739014},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas48785.2022.9937815","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas48785.2022.9937815","pdf_url":null,"source":{"id":"https://openalex.org/S4363604393","display_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W42037993","https://openalex.org/W104720657","https://openalex.org/W2016244202","https://openalex.org/W2044389004","https://openalex.org/W2116374153","https://openalex.org/W2120000030","https://openalex.org/W2151759197","https://openalex.org/W2265382507","https://openalex.org/W2294709132","https://openalex.org/W2321234954","https://openalex.org/W2341260337","https://openalex.org/W2587447851","https://openalex.org/W2800984756","https://openalex.org/W2801237935","https://openalex.org/W2914062206","https://openalex.org/W2953470060","https://openalex.org/W2955419213","https://openalex.org/W2963154589","https://openalex.org/W2977243989","https://openalex.org/W2994145247","https://openalex.org/W2999816604","https://openalex.org/W3002189921","https://openalex.org/W3092333758","https://openalex.org/W3094232604","https://openalex.org/W3147945423","https://openalex.org/W3169847528","https://openalex.org/W6750823410","https://openalex.org/W6772754853"],"related_works":["https://openalex.org/W4211236262","https://openalex.org/W2905275340","https://openalex.org/W4225299998","https://openalex.org/W3120511008","https://openalex.org/W4285107159","https://openalex.org/W2937689900","https://openalex.org/W3214677059","https://openalex.org/W2396711430","https://openalex.org/W4288069010","https://openalex.org/W4312269427"],"abstract_inverted_index":{"Physical":[0],"unclonable":[1],"functions":[2],"(PUFs)":[3],"are":[4,44,124],"hardware":[5],"security":[6,12,26,52,146],"primitives":[7],"that":[8,140],"offer":[9],"a":[10,66,76,88],"lightweight":[11],"solution":[13],"for":[14,62,132],"constrained":[15,67],"devices":[16,63],"in":[17,65],"the":[18,72,94,108,111,120,128,133,141],"Internet":[19],"of":[20,110,119],"Things.":[21],"The":[22,137],"challenges":[23],"facing":[24],"PUFs":[25,43],"scaling":[27],"have":[28],"so":[29],"far":[30],"hindered":[31],"their":[32],"wide-scale":[33],"deployment":[34],"beyond":[35],"simple":[36],"key":[37],"generation":[38],"primitives.":[39],"Although":[40],"physically":[41],"unclonable,":[42],"vulnerable":[45],"to":[46,102,106,126,151],"soft":[47],"modeling":[48],"attacks.":[49],"Many":[50],"PUF":[51,79,104,112,143],"enhancements":[53],"impose":[54],"significant":[55],"implementation":[56,91],"overhead,":[57],"which":[58],"could":[59],"be":[60],"problematic":[61],"operating":[64],"environment.":[68],"This":[69],"work":[70],"introduces":[71],"Cross-Feed":[73],"(XFeed)":[74],"PUF,":[75,96],"highly":[77],"efficient":[78],"circuit":[80,90],"resilient":[81],"against":[82],"machine":[83],"learning":[84],"attacks":[85],"while":[86],"requiring":[87],"small":[89],"area.":[92],"In":[93],"XFeed":[95,135,142],"arbiters":[97],"feed":[98],"intermediate":[99],"race":[100],"conditions":[101],"adjacent":[103],"rows":[105],"increase":[107],"non-linearity":[109],"system.":[113],"A":[114],"systematic":[115],"categorization":[116],"and":[117,148],"benchmarking":[118],"possible":[121],"interconnection":[122],"strategies":[123],"performed":[125],"determine":[127],"near-optimal":[129],"connection":[130],"schemes":[131],"introduced":[134],"PUF.":[136],"results":[138],"showed":[139],"has":[144],"superior":[145],"efficiency":[147],"scalability":[149],"compared":[150],"other":[152],"arbiter":[153],"PUF-based":[154],"enhancements.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
