{"id":"https://openalex.org/W2891953071","doi":"https://doi.org/10.1109/tifs.2018.2870835","title":"Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response","display_name":"Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response","publication_year":2018,"publication_date":"2018-09-17","ids":{"openalex":"https://openalex.org/W2891953071","doi":"https://doi.org/10.1109/tifs.2018.2870835","mag":"2891953071"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2870835","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2870835","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dr.ntu.edu.sg/bitstream/10356/143997/2/Reliable%20and%20Modeling%20Attack%20Resistant%20Authentication%20of%20Arbiter%20PUF%20in%20FPGA%20Implementation%20With%20Trinary%20Quadruple%20Response.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030450394","display_name":"Siarhei S. Zalivaka","orcid":"https://orcid.org/0000-0002-8389-389X"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Siarhei S. Zalivaka","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017887905","display_name":"\u0410. \u0410. \u0418\u0432\u0430\u043d\u044e\u043a","orcid":"https://orcid.org/0000-0002-6541-7742"},"institutions":[{"id":"https://openalex.org/I7452641","display_name":"Belarusian State University of Informatics and Radioelectronics","ror":"https://ror.org/02sehzp52","country_code":"BY","type":"education","lineage":["https://openalex.org/I7452641"]}],"countries":["BY"],"is_corresponding":false,"raw_author_name":"Alexander A. Ivaniuk","raw_affiliation_strings":["Faculty of Computer Systems and Networks, Belarusian State University of Informatics and Radioelectronics, Minsk, Belarus"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Systems and Networks, Belarusian State University of Informatics and Radioelectronics, Minsk, Belarus","institution_ids":["https://openalex.org/I7452641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029335324","display_name":"Chip-Hong Chang","orcid":"https://orcid.org/0000-0002-8897-6176"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chip-Hong Chang","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030450394"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":11.0535,"has_fulltext":true,"cited_by_count":113,"citation_normalized_percentile":{"value":0.98919359,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"14","issue":"4","first_page":"1109","last_page":"1123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.8710000514984131},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.803160548210144},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.7869136929512024},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6596024036407471},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.543472170829773},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.5390206575393677},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.48499390482902527},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4639292359352112},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4014705419540405},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4000434875488281},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3189380466938019},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.15869072079658508},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14953702688217163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1315329372882843}],"concepts":[{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.8710000514984131},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.803160548210144},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.7869136929512024},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6596024036407471},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.543472170829773},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.5390206575393677},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.48499390482902527},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4639292359352112},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4014705419540405},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4000434875488281},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3189380466938019},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.15869072079658508},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14953702688217163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1315329372882843}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2018.2870835","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2870835","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/143997","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/143997","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/143997/2/Reliable%20and%20Modeling%20Attack%20Resistant%20Authentication%20of%20Arbiter%20PUF%20in%20FPGA%20Implementation%20With%20Trinary%20Quadruple%20Response.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"},{"id":"pmh:oai:libeldoc.bsuir.by:123456789/33699","is_oa":false,"landing_page_url":"https://libeldoc.bsuir.by/handle/123456789/33699","pdf_url":null,"source":{"id":"https://openalex.org/S4406923062","display_name":"\u0420\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 \u0411\u0413\u0423\u0418\u0420 (BSUIR Repository)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"\u0421\u0442\u0430\u0442\u044c\u044f"}],"best_oa_location":{"id":"pmh:oai:dr.ntu.edu.sg:10356/143997","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/143997","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/143997/2/Reliable%20and%20Modeling%20Attack%20Resistant%20Authentication%20of%20Arbiter%20PUF%20in%20FPGA%20Implementation%20With%20Trinary%20Quadruple%20Response.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322724","display_name":"Ministry of Education, India","ror":"https://ror.org/048xjjh50"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2891953071.pdf","grobid_xml":"https://content.openalex.org/works/W2891953071.grobid-xml"},"referenced_works_count":70,"referenced_works":["https://openalex.org/W18598421","https://openalex.org/W115326044","https://openalex.org/W136869864","https://openalex.org/W383543526","https://openalex.org/W1473150265","https://openalex.org/W1568970091","https://openalex.org/W1587976329","https://openalex.org/W1598509576","https://openalex.org/W1605172130","https://openalex.org/W1828295566","https://openalex.org/W1836039892","https://openalex.org/W1971935236","https://openalex.org/W1975640051","https://openalex.org/W1976514833","https://openalex.org/W1980497723","https://openalex.org/W1986860396","https://openalex.org/W1989091271","https://openalex.org/W2014299685","https://openalex.org/W2021756047","https://openalex.org/W2028909925","https://openalex.org/W2044389004","https://openalex.org/W2080284304","https://openalex.org/W2083471987","https://openalex.org/W2092858172","https://openalex.org/W2098922534","https://openalex.org/W2103196322","https://openalex.org/W2104401100","https://openalex.org/W2116374153","https://openalex.org/W2126279347","https://openalex.org/W2129004891","https://openalex.org/W2130351941","https://openalex.org/W2137153141","https://openalex.org/W2138077253","https://openalex.org/W2141757723","https://openalex.org/W2151596496","https://openalex.org/W2151759197","https://openalex.org/W2153479592","https://openalex.org/W2165642710","https://openalex.org/W2170334586","https://openalex.org/W2172255798","https://openalex.org/W2211718356","https://openalex.org/W2291849555","https://openalex.org/W2294280833","https://openalex.org/W2297840895","https://openalex.org/W2301210480","https://openalex.org/W2315346806","https://openalex.org/W2341260337","https://openalex.org/W2399798860","https://openalex.org/W2430431245","https://openalex.org/W2443094676","https://openalex.org/W2577417592","https://openalex.org/W2580259249","https://openalex.org/W2610369871","https://openalex.org/W2625230464","https://openalex.org/W2757013445","https://openalex.org/W2806050431","https://openalex.org/W3208670176","https://openalex.org/W4236646429","https://openalex.org/W4237236484","https://openalex.org/W6600786261","https://openalex.org/W6604745394","https://openalex.org/W6605571088","https://openalex.org/W6634142394","https://openalex.org/W6638473360","https://openalex.org/W6643323797","https://openalex.org/W6657546510","https://openalex.org/W6675592523","https://openalex.org/W6676995458","https://openalex.org/W6732605566","https://openalex.org/W6802678510"],"related_works":["https://openalex.org/W4386215421","https://openalex.org/W4386278306","https://openalex.org/W4211236262","https://openalex.org/W2806684872","https://openalex.org/W3212476763","https://openalex.org/W2971643716","https://openalex.org/W4281647828","https://openalex.org/W4318970055","https://openalex.org/W2937689900","https://openalex.org/W4225299998"],"abstract_inverted_index":{"Field":[0],"programmable":[1],"gate":[2],"array":[3],"(FPGA)":[4],"is":[5,105,200],"a":[6,25,80,91,109,136,171,204,246],"potential":[7],"hotbed":[8],"for":[9,30,111,191],"malicious":[10],"and":[11,34,72,125,207,217],"counterfeit":[12],"hardware":[13,263],"infiltration.":[14],"Arbiter-based":[15],"physical":[16],"unclonable":[17],"function":[18],"(A-PUF)":[19],"has":[20,241,277],"been":[21,242,279],"widely":[22],"regarded":[23],"as":[24],"suitable":[26],"lightweight":[27],"security":[28],"primitive":[29],"FPGA":[31,49,88,259],"bitstream":[32],"encryption":[33],"device":[35,82,167,218],"authentication.":[36,192],"Unfortunately,":[37],"the":[38,69,87,116,142,160,166,179,185,194,198,215,222,230,251,257],"metastability":[39,112],"of":[40,90,123,141,145,162,238,248,256],"flip-flop":[41,103],"gives":[42],"rise":[43],"to":[44,59,67,107,119,175,183,197,220,244,282],"poor":[45],"A-PUF":[46,94,173,199,233],"reliability":[47,63,92,247],"in":[48],"implementation.":[50],"Its":[51],"linear":[52],"additive":[53],"path":[54],"delays":[55],"are":[56],"also":[57,169,278],"vulnerable":[58],"modeling":[60,268],"attacks.":[61,76],"Most":[62],"enhancement":[64],"techniques":[65],"tend":[66],"increase":[68],"response":[70,131,148],"predictability":[71],"ease":[73],"machine":[74,227,288],"learning":[75,289],"This":[77,152],"paper":[78],"presents":[79],"robust":[81],"authentication":[83,275],"method":[84],"based":[85],"on":[86],"implementation":[89],"enhanced":[93],"with":[95,149,234,261],"trinary":[96],"digit":[97],"(trit)":[98],"quadruple":[99,130,147,154],"responses.":[100],"A":[101],"two":[102],"arbiter":[104],"used":[106],"produce":[108],"trit":[110,146],"detection.":[113],"By":[114],"considering":[115],"ordered":[117],"responses":[118],"all":[120],"four":[121],"combinations":[122],"first":[124],"last":[126],"challenge":[127,196],"bits,":[128],"each":[129],"can":[132],"be":[133,176,283],"compressed":[134],"into":[135],"quadbit":[137],"that":[138],"represents":[139],"one":[140],"five":[143,240],"classes":[144],"greater":[150],"reproducibility.":[151],"challenge-response":[153,187],"classification":[155],"not":[156],"only":[157],"greatly":[158],"reduces":[159],"burden":[161],"error":[163],"correction":[164],"at":[165,178,213],"but":[168],"enables":[170],"precise":[172],"model":[174],"built":[177],"server":[180,216],"without":[181],"having":[182],"store":[184],"complete":[186],"pair":[188],"(CRP)":[189],"set":[190],"Besides,":[193],"real":[195],"generated":[201],"internally":[202],"by":[203,229],"lossy,":[205],"nonlinear,":[206],"irreversible":[208],"maximum":[209],"length":[210,239],"signature":[211],"generator":[212],"both":[214],"sides":[219],"prevent":[221],"naked":[223],"CRP":[224],"from":[225],"being":[226],"learned":[228],"attacker.":[231],"The":[232,273],"short":[235],"repetition":[236],"code":[237],"tested":[243],"achieve":[245],"1.0":[249],"over":[250],"full":[252],"operating":[253],"temperature":[254],"range":[255],"target":[258],"board":[260],"lower":[262],"resource":[264],"utilization":[265],"than":[266],"other":[267],"attack":[269],"resilient":[270],"strong":[271],"PUFs.":[272],"proposed":[274],"protocol":[276],"experimentally":[280],"evaluated":[281],"practically":[284],"secure":[285],"against":[286],"various":[287],"attacks":[290],"including":[291],"evolutionary":[292],"strategy":[293],"covariance":[294],"matrix":[295],"adaptation.":[296]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2018-09-27T00:00:00"}
