{"id":"https://openalex.org/W3094745711","doi":"https://doi.org/10.1109/tcad.2020.3036807","title":"A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication","display_name":"A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication","publication_year":2020,"publication_date":"2020-11-10","ids":{"openalex":"https://openalex.org/W3094745711","doi":"https://doi.org/10.1109/tcad.2020.3036807","mag":"3094745711"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2020.3036807","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2020.3036807","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/219193150/main_TCAD_2020_0138.R1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089292929","display_name":"Chongyan Gu","orcid":"https://orcid.org/0000-0002-3028-8004"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen\u2019s University Belfast, Belfast, U.K","Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen's University Belfast, Belfast, U.K"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen\u2019s University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen's University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029335324","display_name":"Chip-Hong Chang","orcid":"https://orcid.org/0000-0002-8897-6176"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chip-Hong Chang","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023734605","display_name":"Weiqiang Liu","orcid":"https://orcid.org/0000-0001-8398-8648"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqiang Liu","raw_affiliation_strings":["College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100723817","display_name":"Shichao Yu","orcid":"https://orcid.org/0000-0001-8861-1671"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shichao Yu","raw_affiliation_strings":["Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen\u2019s University Belfast, Belfast, U.K","Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen's University Belfast, Belfast, U.K"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen\u2019s University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen's University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042319744","display_name":"Yale Wang","orcid":"https://orcid.org/0000-0002-2183-4886"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yale Wang","raw_affiliation_strings":["College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079438004","display_name":"M\u00e1ire O\u05f3Neill","orcid":"https://orcid.org/0000-0002-6865-6212"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maire O'Neill","raw_affiliation_strings":["Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen\u2019s University Belfast, Belfast, U.K","Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen's University Belfast, Belfast, U.K"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen\u2019s University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen's University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5089292929"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":8.7219,"has_fulltext":true,"cited_by_count":66,"citation_normalized_percentile":{"value":0.98477372,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"40","issue":"6","first_page":"1183","last_page":"1196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7681834101676941},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6062828898429871},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.585083544254303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5432878136634827},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5379716753959656},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5345327854156494},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.49799418449401855},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4609419107437134},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.45054683089256287},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4033205807209015},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.3770793378353119},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.35197097063064575},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24261194467544556}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7681834101676941},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6062828898429871},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.585083544254303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5432878136634827},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5379716753959656},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5345327854156494},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.49799418449401855},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4609419107437134},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.45054683089256287},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4033205807209015},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3770793378353119},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.35197097063064575},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24261194467544556}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tcad.2020.3036807","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2020.3036807","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/d01dbed0-8422-45c7-ab49-dfeca8ce062f","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/d01dbed0-8422-45c7-ab49-dfeca8ce062f","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/219193150/main_TCAD_2020_0138.R1.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gu , C , Chang , C H , Liu , W , Yu , S , Wang , Y &amp; O'Neill , M 2020 , ' A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF based Authentication ' , IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems . https://doi.org/10.1109/TCAD.2020.3036807","raw_type":"article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/152417","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/152417","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/d01dbed0-8422-45c7-ab49-dfeca8ce062f","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/d01dbed0-8422-45c7-ab49-dfeca8ce062f","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/219193150/main_TCAD_2020_0138.R1.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gu , C , Chang , C H , Liu , W , Yu , S , Wang , Y &amp; O'Neill , M 2020 , ' A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF based Authentication ' , IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems . https://doi.org/10.1109/TCAD.2020.3036807","raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G1015339052","display_name":null,"funder_award_id":"MOE2018-T1-001-131 RG87/18(S)","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G152082041","display_name":null,"funder_award_id":"-CSIT2","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G1934935867","display_name":null,"funder_award_id":"Engineering and Physical Sciences R","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2064802375","display_name":null,"funder_award_id":"61771239","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2177115845","display_name":null,"funder_award_id":"N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3131894466","display_name":null,"funder_award_id":"EP/N508664/-CSIT2","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4070429046","display_name":null,"funder_award_id":"62022041","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4804264507","display_name":null,"funder_award_id":"EP/N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320320751","display_name":"Ministry of Education - Singapore","ror":"https://ror.org/01kcva023"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320322724","display_name":"Ministry of Education, India","ror":"https://ror.org/048xjjh50"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3094745711.pdf","grobid_xml":"https://content.openalex.org/works/W3094745711.grobid-xml"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W60915736","https://openalex.org/W104720657","https://openalex.org/W132856916","https://openalex.org/W338742241","https://openalex.org/W1544967376","https://openalex.org/W1917333369","https://openalex.org/W1966117405","https://openalex.org/W1972148032","https://openalex.org/W1975518327","https://openalex.org/W1993489119","https://openalex.org/W2000171858","https://openalex.org/W2006550815","https://openalex.org/W2014299685","https://openalex.org/W2016244202","https://openalex.org/W2041435997","https://openalex.org/W2044389004","https://openalex.org/W2052828598","https://openalex.org/W2054288246","https://openalex.org/W2080284304","https://openalex.org/W2080856113","https://openalex.org/W2094192676","https://openalex.org/W2099319333","https://openalex.org/W2123482651","https://openalex.org/W2130351941","https://openalex.org/W2145858709","https://openalex.org/W2155489620","https://openalex.org/W2161426357","https://openalex.org/W2169212403","https://openalex.org/W2171762889","https://openalex.org/W2249570833","https://openalex.org/W2265382507","https://openalex.org/W2289245055","https://openalex.org/W2321234954","https://openalex.org/W2336687883","https://openalex.org/W2524910869","https://openalex.org/W2603856766","https://openalex.org/W2691880447","https://openalex.org/W2749093550","https://openalex.org/W2752832485","https://openalex.org/W2793303626","https://openalex.org/W2801615404","https://openalex.org/W2951099140","https://openalex.org/W2966916323","https://openalex.org/W2986932134","https://openalex.org/W2997932026","https://openalex.org/W3003262893","https://openalex.org/W3147945423","https://openalex.org/W3194506215","https://openalex.org/W4233101919","https://openalex.org/W4249899149","https://openalex.org/W4324106947","https://openalex.org/W6678473589","https://openalex.org/W6773325117","https://openalex.org/W6800815191"],"related_works":["https://openalex.org/W141692544","https://openalex.org/W2383459869","https://openalex.org/W2355452447","https://openalex.org/W2482813613","https://openalex.org/W2363600212","https://openalex.org/W2388928260","https://openalex.org/W2141085719","https://openalex.org/W2479833502","https://openalex.org/W1661403104","https://openalex.org/W2357266202"],"abstract_inverted_index":{"Silicon":[0],"physical":[1],"unclonable":[2],"function":[3],"(PUF)":[4],"has":[5],"emerged":[6],"as":[7],"a":[8,24,53,69,73,112,115,119,124,127,132,134,137,140,175,182],"promising":[9],"spoof-proof":[10],"solution":[11],"for":[12,95,154,217,261],"low-cost":[13],"device":[14,74,113,164,180,231,273],"authentication.":[15,97],"Due":[16],"to":[17,43,61,105,205,214,222],"practical":[18,64],"constraints":[19],"in":[20,66,197],"preventing":[21],"phishing":[22],"through":[23,166],"public":[25],"network":[26],"or":[27,86,232],"insecure":[28],"communication":[29],"channels,":[30],"simple":[31,141],"PUF-based":[32,57],"authentication":[33,59,177],"protocol":[34,104],"with":[35,75,114,178],"unrestricted":[36],"queries":[37],"and":[38,45,139,191,274,283],"transparent":[39],"responses":[40],"is":[41,248],"vulnerable":[42],"modeling":[44,54],"replay":[46],"attacks.":[47],"In":[48],"this":[49],"article,":[50],"we":[51],"present":[52],"attack":[55,284],"resistant":[56],"mutual":[58,176],"scheme":[60,99],"mitigate":[62],"the":[63,81,91,96,147,167,179,189,192,203,230,233,238,251,258,279,287],"limitations":[65],"applications":[67],"where":[68],"resource-rich":[70],"server":[71,172,190],"authenticates":[72],"no":[76],"strong":[77,121],"restriction":[78],"imposed":[79],"on":[80,90,111,268],"type":[82],"of":[83,118,149,253,286],"PUF":[84,122,246],"design":[85],"any":[87],"additional":[88],"protection":[89],"binary":[92,135],"channel":[93],"used":[94],"Our":[98,265],"uses":[100],"an":[101,218],"active":[102],"deception":[103,289],"prevent":[106],"machine":[107],"learning":[108],"(ML)":[109],"attacks":[110],"monolithic":[116],"integration":[117],"genuine":[120,171],"(SPUF),":[123],"fake":[125],"PUF,":[126],"pseudorandom":[128],"number":[129],"generator":[130],"(PRNG),":[131],"register,":[133],"counter,":[136],"comparator,":[138],"controller.":[142],"The":[143,194,210,244],"hardware":[144,281],"encapsulation":[145],"makes":[146],"collection":[148],"challenge-response":[150],"pairs":[151],"(CRPs)":[152],"easy":[153],"model":[155,235],"building":[156],"during":[157],"enrollment":[158],"but":[159],"prohibitively":[160],"time":[161,221,255,259],"consuming":[162],"upon":[163],"deployment":[165],"same":[168],"interface.":[169],"A":[170],"can":[173],"perform":[174],"using":[181],"combined":[183],"fresh":[184],"challenge":[185],"contributed":[186],"by":[187,202,227,256],"both":[188],"device.":[193],"message":[195],"exchanged":[196],"clear":[198],"cannot":[199],"be":[200,242],"manipulated":[201],"adversary":[204,211],"derive":[206],"unused":[207],"authentic":[208],"CRPs.":[209],"will":[212,241],"have":[213,277],"either":[215],"wait":[216],"impractically":[219],"long":[220],"collect":[223],"enough":[224],"real":[225],"CRPs":[226,240],"directly":[228],"querying":[229],"ML":[234],"derived":[236],"from":[237],"collected":[239],"poisoned.":[243],"false":[245],"multiplexing":[247],"fortified":[249],"against":[250],"prediction":[252],"waiting":[254],"doubling":[257],"penalty":[260],"every":[262],"unsuccessful":[263],"guess.":[264],"implementation":[266],"results":[267],"field-programmable":[269],"gate":[270],"array":[271],"(FPGA)":[272],"security":[275],"analysis":[276],"corroborated":[278],"low":[280],"overheads":[282],"resistance":[285],"proposed":[288],"protocol.":[290]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":14}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
