{"id":"https://openalex.org/W4312771842","doi":"https://doi.org/10.1109/iscas48785.2022.9937976","title":"Stochastic Selection of Responses for Physically Unclonable Functions","display_name":"Stochastic Selection of Responses for Physically Unclonable Functions","publication_year":2022,"publication_date":"2022-05-28","ids":{"openalex":"https://openalex.org/W4312771842","doi":"https://doi.org/10.1109/iscas48785.2022.9937976"},"language":"en","primary_location":{"id":"doi:10.1109/iscas48785.2022.9937976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas48785.2022.9937976","pdf_url":null,"source":{"id":"https://openalex.org/S4363604393","display_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027642843","display_name":"Pablo Rojas","orcid":null},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pablo Rojas","raw_affiliation_strings":["University of Louisiana at Lafayette,Department of Electrical and Computer Engineering,USA","Department of Electrical and Computer Engineering, University of Louisiana at Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Lafayette,Department of Electrical and Computer Engineering,USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Louisiana at Lafayette, USA","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034819596","display_name":"Haytham Idriss","orcid":"https://orcid.org/0000-0002-2904-9137"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haytham Idriss","raw_affiliation_strings":["University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024773614","display_name":"Sara Alahmadi","orcid":null},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sara Alahmadi","raw_affiliation_strings":["University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Lafayette,Center for Advanced Computer Studies,USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010023744","display_name":"Magdy Bayoumi","orcid":"https://orcid.org/0000-0002-0630-5273"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Magdy Bayoumi","raw_affiliation_strings":["University of Louisiana at Lafayette,Department of Electrical and Computer Engineering,USA","Department of Electrical and Computer Engineering, University of Louisiana at Lafayette, USA"],"affiliations":[{"raw_affiliation_string":"University of Louisiana at Lafayette,Department of Electrical and Computer Engineering,USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Louisiana at Lafayette, USA","institution_ids":["https://openalex.org/I79516672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027642843"],"corresponding_institution_ids":["https://openalex.org/I79516672"],"apc_list":null,"apc_paid":null,"fwci":0.6431,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60566229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"471","last_page":"475"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.8235058784484863},{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.8017597198486328},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7074929475784302},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6477140188217163},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5458188652992249},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5444953441619873},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5336682796478271},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.48000210523605347},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.47862404584884644},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43677592277526855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4016092121601105},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3776935338973999},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.359372079372406},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3520342707633972},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.33473914861679077},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3222147524356842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23500755429267883},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.1756516695022583}],"concepts":[{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.8235058784484863},{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.8017597198486328},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7074929475784302},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6477140188217163},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5458188652992249},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5444953441619873},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5336682796478271},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.48000210523605347},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.47862404584884644},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43677592277526855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4016092121601105},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3776935338973999},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.359372079372406},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3520342707633972},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33473914861679077},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3222147524356842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23500755429267883},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.1756516695022583}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas48785.2022.9937976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas48785.2022.9937976","pdf_url":null,"source":{"id":"https://openalex.org/S4363604393","display_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2000171858","https://openalex.org/W2014299685","https://openalex.org/W2016244202","https://openalex.org/W2044389004","https://openalex.org/W2145858709","https://openalex.org/W2321234954","https://openalex.org/W2767545991","https://openalex.org/W2982413008","https://openalex.org/W3092697589","https://openalex.org/W3094232604"],"related_works":["https://openalex.org/W4386215421","https://openalex.org/W4288102672","https://openalex.org/W4386278306","https://openalex.org/W4375857400","https://openalex.org/W2789961440","https://openalex.org/W2582407527","https://openalex.org/W2793303626","https://openalex.org/W1473150265","https://openalex.org/W2905275340","https://openalex.org/W4233101919"],"abstract_inverted_index":{"Challenges":[0],"in":[1,24,168,177],"securing":[2],"the":[3,11,97,105,162,169,178,184,187],"Internet":[4],"of":[5,13,41,85,107,122,144,180,186],"Things":[6],"(IoT)":[7],"has":[8,69],"led":[9],"to":[10,91,126,197,201],"development":[12],"novel":[14,101],"technologies":[15],"such":[16,48],"as":[17,49],"physically":[18],"unclonable":[19],"functions":[20],"(PUFs).":[21],"Having":[22],"applications":[23],"both":[25],"lightweight":[26],"authentication":[27],"and":[28,52,60,135],"key":[29],"generation":[30],"protocols":[31],"for":[32,111,159],"IoT":[33],"devices,":[34],"PUFs":[35,47,51,54,74],"have":[36],"received":[37],"a":[38,100,120,153,173,194],"great":[39],"deal":[40],"research.":[42],"Despite":[43],"their":[44],"promise,":[45],"delay-based":[46,73],"Arbiter":[50],"4-XOR":[53],"are":[55,133,147],"easily":[56],"modeled":[57],"with":[58],"600":[59],"50,":[61],"000":[62,156],"challenge-response":[63],"pairs":[64],"(CRPs),":[65],"respectively.":[66],"While":[67],"it":[68,88],"been":[70],"shown":[71],"that":[72,103,141],"can":[75],"be":[76],"further":[77],"improved":[78],"by":[79,115],"XORing":[80],"together":[81],"an":[82],"increasing":[83],"number":[84,179],"PUF":[86,113,132,146],"instances,":[87],"also":[89,191],"tends":[90],"become":[92],"area-inefficient.":[93],"In":[94],"this":[95],"paper":[96],"authors":[98],"propose":[99],"method":[102],"combats":[104],"effectiveness":[106],"machine":[108,148],"learning":[109,149],"algorithms":[110],"modeling":[112,170],"behaviors":[114],"randomly":[116],"selecting":[117],"responses":[118],"from":[119],"pool":[121],"PUFs.":[123],"Six":[124],"variants":[125,143],"our":[127],"Random":[128],"Bit":[129],"Selection":[130],"(RBS)":[131],"proposed":[134,188],"investigated.":[136],"The":[137],"yielded":[138],"results":[139,163],"show":[140,198],"specific":[142],"RBS":[145],"resistant":[150],"despite":[151,172],"using":[152],"5,":[154],"760,":[155],"CRP":[157],"dataset":[158],"training.":[160],"Furthermore,":[161],"indicate":[164],"no":[165],"significant":[166],"improvement":[167],"algorithm":[171],"100":[174],"times":[175],"increase":[176],"CRPs":[181],"used.":[182],"Finally,":[183],"security":[185],"design":[189],"is":[190],"evaluated":[192],"through":[193],"brute-force":[195,202],"analysis":[196],"its":[199],"resistance":[200],"attacks.":[203]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
