{"id":"https://openalex.org/W3012451034","doi":"https://doi.org/10.1109/sips47522.2019.9020613","title":"A Secure and Robust Key Generation Method Using Physical Unclonable Functions and Polar Codes","display_name":"A Secure and Robust Key Generation Method Using Physical Unclonable Functions and Polar Codes","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3012451034","doi":"https://doi.org/10.1109/sips47522.2019.9020613","mag":"3012451034"},"language":"en","primary_location":{"id":"doi:10.1109/sips47522.2019.9020613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sips47522.2019.9020613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Signal Processing Systems (SiPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103149772","display_name":"Yonghong Bai","orcid":"https://orcid.org/0000-0003-4230-5243"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yonghong Bai","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Lehigh University, Bethlehem, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Lehigh University, Bethlehem, PA, USA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101582861","display_name":"Zhiyuan Yan","orcid":"https://orcid.org/0000-0003-2286-2771"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiyuan Yan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Lehigh University, Bethlehem, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Lehigh University, Bethlehem, PA, USA","institution_ids":["https://openalex.org/I186143895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103149772"],"corresponding_institution_ids":["https://openalex.org/I186143895"],"apc_list":null,"apc_paid":null,"fwci":1.6854,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.84724759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"254","last_page":"259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.8029422760009766},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7201899290084839},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6887025833129883},{"id":"https://openalex.org/keywords/polar","display_name":"Polar","score":0.6802072525024414},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6239172220230103},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5219404101371765},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.48061603307724},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3615098297595978},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32018059492111206},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3103730082511902},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2927702069282532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23598209023475647},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16550827026367188},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08086037635803223},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0716242790222168}],"concepts":[{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.8029422760009766},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7201899290084839},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6887025833129883},{"id":"https://openalex.org/C29705727","wikidata":"https://www.wikidata.org/wiki/Q294562","display_name":"Polar","level":2,"score":0.6802072525024414},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6239172220230103},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5219404101371765},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.48061603307724},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3615098297595978},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32018059492111206},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3103730082511902},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2927702069282532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23598209023475647},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16550827026367188},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08086037635803223},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0716242790222168},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sips47522.2019.9020613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sips47522.2019.9020613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Signal Processing Systems (SiPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W203309928","https://openalex.org/W1515439914","https://openalex.org/W1532483809","https://openalex.org/W1875021344","https://openalex.org/W1922829621","https://openalex.org/W1970402036","https://openalex.org/W2000171858","https://openalex.org/W2043769961","https://openalex.org/W2052828598","https://openalex.org/W2101067964","https://openalex.org/W2102576814","https://openalex.org/W2113237846","https://openalex.org/W2129004891","https://openalex.org/W2130351941","https://openalex.org/W2139784773","https://openalex.org/W2144336066","https://openalex.org/W2150498905","https://openalex.org/W2151759197","https://openalex.org/W2211831180","https://openalex.org/W2225497109","https://openalex.org/W2291918266","https://openalex.org/W2296687408","https://openalex.org/W2500740922","https://openalex.org/W2504015706","https://openalex.org/W2570008916","https://openalex.org/W2739497507","https://openalex.org/W2745643874","https://openalex.org/W2770319036","https://openalex.org/W2893992531","https://openalex.org/W3123299285","https://openalex.org/W4255672150","https://openalex.org/W6608237463","https://openalex.org/W6681749759"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W3095894856","https://openalex.org/W4248992603"],"abstract_inverted_index":{"In":[0],"physical":[1],"unclonable":[2],"functions":[3],"(PUFs)":[4],"based":[5,24],"key":[6,21,38,64,144,154,170],"generation":[7,22,39,65,145,155],"methods,":[8],"the":[9,56,61,69,74,81,92,106,110,114,118,122,135,143,167],"bias":[10,75],"of":[11,63,76,95,113,134],"PUF":[12,77,159],"outputs":[13],"would":[14],"leak":[15],"secrecy.":[16],"A":[17],"secure":[18,49,82,136],"and":[19,27,66,109,150],"robust":[20],"method":[23,127],"on":[25],"PUFs":[26],"polar":[28,50,83,119,125,137],"codes":[29],"is":[30,41,88,101],"proposed":[31],"in":[32,99],"this":[33],"paper.":[34],"First,":[35],"a":[36,44],"PUF-based":[37],"process":[40],"modeled":[42],"as":[43],"wiretap":[45,57],"channel.":[46],"Then,":[47],"two":[48],"coding":[51,84,138],"schemes":[52],"are":[53],"designed":[54],"for":[55],"channel":[58,123],"to":[59,67,90,103,131],"improve":[60],"robustness":[62],"reduce":[68,117],"secrecy":[70,111],"leakage":[71,112],"caused":[72],"by":[73],"outputs.":[78],"To":[79,116],"construct":[80],"schemes,":[85],"density":[86,129],"evolution":[87,130],"used":[89,102],"evaluate":[91],"error":[93,107],"probability":[94,108,173],"synthesized":[96],"channels,":[97],"which":[98],"turn":[100],"approximate":[104],"both":[105],"system.":[115],"construction":[120,126],"complexity,":[121],"independent":[124],"aids":[128],"select":[132],"parameters":[133],"schemes.":[139],"Finally,":[140],"we":[141],"compare":[142],"design":[146],"with":[147,171],"other":[148,162],"works":[149,163],"find":[151],"that":[152],"our":[153],"scheme":[156],"requires":[157],"fewer":[158],"bits":[160],"than":[161],"when":[164],"they":[165],"generate":[166],"same":[168],"length":[169],"failure":[172],"$\\le":[174],"10^{-6}$.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
