{"id":"https://openalex.org/W4380763482","doi":"https://doi.org/10.1109/tcad.2023.3286260","title":"Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT","display_name":"Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT","publication_year":2023,"publication_date":"2023-06-15","ids":{"openalex":"https://openalex.org/W4380763482","doi":"https://doi.org/10.1109/tcad.2023.3286260"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2023.3286260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2023.3286260","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100403814","display_name":"Xiaolin Zhang","orcid":"https://orcid.org/0000-0002-3833-1134"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaolin Zhang","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054694797","display_name":"Tengfei Wang","orcid":"https://orcid.org/0000-0003-0297-0281"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tengfei Wang","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100383569","display_name":"Yu Huang","orcid":"https://orcid.org/0000-0002-6182-3153"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu Huang","raw_affiliation_strings":["HiSilicon Technologies Company, Ltd., Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"HiSilicon Technologies Company, Ltd., Shenzhen, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100403814"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":2.4539,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.88301945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"42","issue":"12","first_page":"4569","last_page":"4582"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7223623394966125},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.6239476203918457},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5948328375816345},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5474265217781067},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5273576378822327},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.518281877040863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4865044951438904},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4807465076446533},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.4521231949329376},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.42906442284584045},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.374625563621521},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36706066131591797},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32492515444755554},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10300809144973755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7223623394966125},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.6239476203918457},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5948328375816345},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5474265217781067},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5273576378822327},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.518281877040863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4865044951438904},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4807465076446533},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.4521231949329376},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.42906442284584045},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.374625563621521},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36706066131591797},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32492515444755554},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10300809144973755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2023.3286260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2023.3286260","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1677757025","display_name":null,"funder_award_id":"22511101300","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"}],"funders":[{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1504211573","https://openalex.org/W1537849967","https://openalex.org/W1802259427","https://openalex.org/W1866349918","https://openalex.org/W1982494235","https://openalex.org/W2139747141","https://openalex.org/W2145227448","https://openalex.org/W2165214731","https://openalex.org/W2169212403","https://openalex.org/W2189299614","https://openalex.org/W2408171098","https://openalex.org/W2408271648","https://openalex.org/W2483049553","https://openalex.org/W2801237935","https://openalex.org/W2804072773","https://openalex.org/W2943373652","https://openalex.org/W2966916323","https://openalex.org/W2983712344","https://openalex.org/W3013603628","https://openalex.org/W3031496357","https://openalex.org/W3048485013","https://openalex.org/W3081832642","https://openalex.org/W3083387057","https://openalex.org/W3088704016","https://openalex.org/W3094603038","https://openalex.org/W3133167475","https://openalex.org/W3142542690","https://openalex.org/W3186471288","https://openalex.org/W3194287334","https://openalex.org/W3195000612","https://openalex.org/W3195498038","https://openalex.org/W3199019792","https://openalex.org/W3213655269","https://openalex.org/W4220658028","https://openalex.org/W4235801565","https://openalex.org/W4238938772","https://openalex.org/W4361987546","https://openalex.org/W6687257779","https://openalex.org/W6769875893","https://openalex.org/W6775537646","https://openalex.org/W6778430791","https://openalex.org/W6803615543","https://openalex.org/W6893369858"],"related_works":["https://openalex.org/W2951181267","https://openalex.org/W2407726188","https://openalex.org/W3210000570","https://openalex.org/W4302854873","https://openalex.org/W3216230948","https://openalex.org/W3030044402","https://openalex.org/W3124916713","https://openalex.org/W2093324650","https://openalex.org/W2612627043","https://openalex.org/W37362883"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,35,65,198],"Things":[3],"(IoT)":[4],"facilitates":[5],"the":[6,33,143,151,163,184],"information":[7],"exchange":[8],"between":[9],"people":[10],"and":[11,22,119,154,182,201,213],"smart":[12],"devices.":[13],"It":[14],"needs":[15],"cryptographic":[16,86,114],"measures":[17],"to":[18,32,78,96,136,178,189],"secure":[19,158],"its":[20],"communications":[21],"interconnected":[23],"objects.":[24],"However,":[25],"cyber\u2013physical":[26],"attacks":[27],"pose":[28],"a":[29,44,55,58,62,75,83,93,104,133,169,216],"great":[30],"challenge":[31],"protection":[34],"secret":[36],"keys":[37],"inside.":[38],"Physically":[39],"unclonable":[40,49],"function":[41],"(PUF)":[42],"is":[43,147,156],"promising":[45],"hardware":[46],"primitive":[47],"with":[48],"structures":[50],"providing":[51],"tamper":[52],"evidence":[53],"for":[54,219],"device.":[56],"Moreover,":[57],"PUF":[59,118,202,212],"instance":[60],"has":[61],"unique":[63],"set":[64],"randomized":[66],"challenge\u2013response":[67],"pairs.":[68],"Although":[69],"it":[70,155,193],"can":[71,123,214],"be":[72,124,215],"integrated":[73],"into":[74],"security":[76,141],"scheme":[77,110],"replace":[79],"long-term":[80],"keys,":[81],"designing":[82],"dedicated":[84],"PUF-based":[85,106,191],"algorithm":[87],"that":[88,111,130],"supports":[89],"peer-to-peer":[90],"communication":[91],"remains":[92],"challenging":[94],"field":[95],"explore.":[97],"In":[98,165],"this":[99],"article,":[100],"we":[101,167],"propose":[102],"SPEAR,":[103,177],"scalable":[105,208],"authenticated":[107],"encryption":[108],"(AE)":[109],"uses":[112],"no":[113],"primitives":[115],"other":[116,190],"than":[117],"hash":[120],"functions.":[121],"SPEAR":[122,205],"deployed":[125],"on":[126,211],"peer":[127],"IoT":[128],"devices":[129],"have":[131],"performed":[132],"handshake":[134],"protocol":[135],"obtain":[137],"shared":[138],"credentials.":[139,164],"Its":[140],"under":[142],"chosen":[144],"ciphertext":[145],"attack":[146],"formally":[148],"proved":[149],"using":[150],"game-playing":[152],"technique,":[153],"still":[157],"when":[159],"attackers":[160],"physically":[161],"extract":[162],"addition,":[166],"give":[168],"variant,":[170],"<inline-formula":[171],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[172],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[173],"<tex-math":[174],"notation=\"LaTeX\">$x$":[175],"</tex-math></inline-formula>":[176],"involve":[179],"associated":[180],"data":[181],"avoid":[183],"nonce":[185],"reuse":[186],"problem.":[187],"Compared":[188],"ciphers,":[192],"performs":[194],"better":[195],"in":[196],"terms":[197],"storage":[199],"overhead":[200],"evaluation":[203],"times.":[204],"first":[206],"realizes":[207],"AE":[209],"based":[210],"practical":[217],"solution":[218],"IoT.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
