{"id":"https://openalex.org/W2161426357","doi":"https://doi.org/10.1145/1284680.1284683","title":"Controlled physical random functions and applications","display_name":"Controlled physical random functions and applications","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2161426357","doi":"https://doi.org/10.1145/1284680.1284683","mag":"2161426357"},"language":"en","primary_location":{"id":"doi:10.1145/1284680.1284683","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1284680.1284683","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085346632","display_name":"Blaise Gassend","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Blaise Gassend","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075756968","display_name":"Marten van Dijk","orcid":"https://orcid.org/0000-0001-9388-8050"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marten Van Dijk","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062370811","display_name":"Dwaine Clarke","orcid":"https://orcid.org/0000-0001-5087-6148"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dwaine Clarke","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088791029","display_name":"Emina Torlak","orcid":"https://orcid.org/0000-0002-1155-2711"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emina Torlak","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000525449","display_name":"Srinivas Devadas","orcid":"https://orcid.org/0000-0001-8253-7714"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srinivas Devadas","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029883274","display_name":"Pim Tuyls","orcid":null},"institutions":[{"id":"https://openalex.org/I1329325741","display_name":"Philips (Finland)","ror":"https://ror.org/01g4jev56","country_code":"FI","type":"company","lineage":["https://openalex.org/I1329325741","https://openalex.org/I4210122849"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Pim Tuyls","raw_affiliation_strings":["Philips Research, Eindhoven"],"affiliations":[{"raw_affiliation_string":"Philips Research, Eindhoven","institution_ids":["https://openalex.org/I1329325741"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085346632"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":3.8127,"has_fulltext":false,"cited_by_count":124,"citation_normalized_percentile":{"value":0.93970084,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"10","issue":"4","first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8518816232681274},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.6605315208435059},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6110196113586426},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5399015545845032},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5147947669029236},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5142988562583923},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5091678500175476},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.503156840801239},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.433610200881958},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3763634264469147},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35253000259399414},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3291878402233124}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8518816232681274},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.6605315208435059},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6110196113586426},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5399015545845032},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5147947669029236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5142988562583923},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5091678500175476},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.503156840801239},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.433610200881958},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3763634264469147},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35253000259399414},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3291878402233124},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1284680.1284683","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1284680.1284683","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W42860166","https://openalex.org/W132856916","https://openalex.org/W185166390","https://openalex.org/W198856816","https://openalex.org/W1247015877","https://openalex.org/W1501486502","https://openalex.org/W1559498407","https://openalex.org/W1583816927","https://openalex.org/W1597805936","https://openalex.org/W1873919580","https://openalex.org/W2000171858","https://openalex.org/W2006097283","https://openalex.org/W2036601091","https://openalex.org/W2060440626","https://openalex.org/W2065207200","https://openalex.org/W2074845051","https://openalex.org/W2108255910","https://openalex.org/W2123482651","https://openalex.org/W2133422510","https://openalex.org/W2140972824","https://openalex.org/W2145858709","https://openalex.org/W2151759197","https://openalex.org/W2154909745","https://openalex.org/W2156420172","https://openalex.org/W2161439816","https://openalex.org/W2169212403","https://openalex.org/W2172255798","https://openalex.org/W2225497109","https://openalex.org/W3104073697","https://openalex.org/W4206314719","https://openalex.org/W4251100134","https://openalex.org/W4285719527","https://openalex.org/W4300807510","https://openalex.org/W4386706555"],"related_works":["https://openalex.org/W1533109710","https://openalex.org/W2951667575","https://openalex.org/W2740348784","https://openalex.org/W174224734","https://openalex.org/W1899457542","https://openalex.org/W4206916324","https://openalex.org/W2901444369","https://openalex.org/W2533699404","https://openalex.org/W4298167222","https://openalex.org/W2122622142"],"abstract_inverted_index":{"The":[0,75,89,116],"cryptographic":[1,117],"protocols":[2,54,178],"that":[3,55,84,133,155,179,200],"we":[4],"use":[5,59],"in":[6,16,137,151],"everyday":[7],"life":[8],"rely":[9],"on":[10],"the":[11,52,112,126,135,139,166,173,194,206],"secure":[12],"storage":[13],"of":[14,85,98,119,163,165,188],"keys":[15,21,49],"consumer":[17],"devices.":[18],"Protecting":[19],"these":[20],"from":[22],"invasive":[23],"attackers,":[24],"who":[25],"open":[26],"a":[27,34,67,86,95,99,106,120,146,160,186,198],"device":[28],"to":[29,47,58,94,105,110,172,190,202],"steal":[30],"its":[31],"key,":[32],"is":[33,66,92,128,145,154],"challenging":[35],"problem.":[36],"We":[37,176,209],"propose":[38],"controlled":[39],"physical":[40,62,68],"random":[41,63,87],"functions":[42,64],"(CPUFs)":[43],"as":[44,216],"an":[45,71,131],"alternative":[46],"storing":[48],"and":[50,73,80,184,197],"describe":[51],"core":[53],"are":[56,122],"needed":[57],"CPUFs.":[60],"A":[61,148],"(PUF)":[65],"system":[69],"with":[70,130,205],"input":[72,79],"output.":[74],"functional":[76],"relationship":[77,91],"between":[78,193],"output":[81],"looks":[82],"like":[83],"function.":[88],"particular":[90,107],"unique":[93],"specific":[96],"instance":[97,109],"PUF,":[100],"hence,":[101],"one":[102],"needs":[103],"access":[104],"PUF":[108,121,127,140,207],"evaluate":[111],"function":[113],"it":[114],"embodies.":[115],"applications":[118],"quite":[123],"limited":[124],"unless":[125],"combined":[129],"algorithm":[132],"limits":[134],"ways":[136],"which":[138],"can":[141,157],"be":[142,191],"evaluated;":[143],"this":[144,182],"CPUF.":[147],"major":[149],"difficulty":[150,183],"using":[152],"CPUFs":[153],"you":[156],"only":[158],"know":[159],"small":[161],"set":[162],"outputs":[164,169],"PUF\u2014the":[167],"unknown":[168],"being":[170],"unrelated":[171],"known":[174],"ones.":[175],"present":[177,211],"get":[180],"around":[181],"allow":[185],"chain":[187],"trust":[189],"established":[192],"CPUF":[195],"manufacturer":[196],"party":[199],"wishes":[201],"interact":[203],"securely":[204],"device.":[208],"also":[210],"some":[212],"elementary":[213],"applications,":[214],"such":[215],"certified":[217],"execution.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":4}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
