{"id":"https://openalex.org/W2889069601","doi":"https://doi.org/10.3390/cryptography2030021","title":"Correlation-Based Robust Authentication (Cobra) Using Helper Data Only","display_name":"Correlation-Based Robust Authentication (Cobra) Using Helper Data Only","publication_year":2018,"publication_date":"2018-08-31","ids":{"openalex":"https://openalex.org/W2889069601","doi":"https://doi.org/10.3390/cryptography2030021","mag":"2889069601"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2030021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030021","pdf_url":"https://www.mdpi.com/2410-387X/2/3/21/pdf?version=1535701313","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/3/21/pdf?version=1535701313","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029774084","display_name":"Jim Plusquellic","orcid":"https://orcid.org/0000-0002-1876-117X"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jim Plusquellic","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA","IC-Safety, LLC, Albuquerque, NM 87131, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA","institution_ids":["https://openalex.org/I169521973"]},{"raw_affiliation_string":"IC-Safety, LLC, Albuquerque, NM 87131, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110568959","display_name":"Matt Areno","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matt Areno","raw_affiliation_strings":["Trusted and Secure Systems, LLC, Round Rock, TX 78665, USA"],"affiliations":[{"raw_affiliation_string":"Trusted and Secure Systems, LLC, Round Rock, TX 78665, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029774084"],"corresponding_institution_ids":["https://openalex.org/I169521973"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.5264,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63390264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2","issue":"3","first_page":"21","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7648966312408447},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6714566946029663},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.44458338618278503},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.4428235590457916},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4195016622543335},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41673150658607483},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.41505905985832214},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.396693617105484},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2983224391937256},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17511463165283203},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1606067419052124}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7648966312408447},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6714566946029663},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.44458338618278503},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.4428235590457916},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4195016622543335},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41673150658607483},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.41505905985832214},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.396693617105484},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2983224391937256},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17511463165283203},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1606067419052124},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography2030021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030021","pdf_url":"https://www.mdpi.com/2410-387X/2/3/21/pdf?version=1535701313","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2da486dc44f64a7c823f5f6b38fb9612","is_oa":true,"landing_page_url":"https://doaj.org/article/2da486dc44f64a7c823f5f6b38fb9612","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 3, p 21 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/3/21/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2030021","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2030021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030021","pdf_url":"https://www.mdpi.com/2410-387X/2/3/21/pdf?version=1535701313","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2889069601.pdf","grobid_xml":"https://content.openalex.org/works/W2889069601.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W22810531","https://openalex.org/W2016244202","https://openalex.org/W2034189882","https://openalex.org/W2052908934","https://openalex.org/W2116359098","https://openalex.org/W2122394567","https://openalex.org/W2130351941","https://openalex.org/W2155489620","https://openalex.org/W2473104956","https://openalex.org/W2550230066","https://openalex.org/W2570008916","https://openalex.org/W2623431170","https://openalex.org/W2766808357","https://openalex.org/W2784310609","https://openalex.org/W2808322051","https://openalex.org/W4232199654","https://openalex.org/W4250392962","https://openalex.org/W6631862039"],"related_works":["https://openalex.org/W3148339641","https://openalex.org/W2184096640","https://openalex.org/W3018478474","https://openalex.org/W2363944576","https://openalex.org/W2351041855","https://openalex.org/W2598729596","https://openalex.org/W2570254841","https://openalex.org/W3012528295","https://openalex.org/W2742986847","https://openalex.org/W2910284721"],"abstract_inverted_index":{"Physical":[0],"unclonable":[1],"function":[2],"(PUF)-based":[3],"authentication":[4,15,36,143],"protocols":[5],"have":[6],"been":[7],"proposed":[8],"as":[9],"a":[10,65,72,82,130,162,192,198,212],"strong":[11,30,50],"challenge-response":[12],"form":[13],"of":[14,18,27,46,68,81,89,178,214],"for":[16,35,142,157],"internet":[17],"things":[19],"(IoT)":[20],"and":[21,64,105,110,137,165,176,224],"embedded":[22],"applications.":[23],"A":[24],"special":[25],"class":[26],"so":[28],"called":[29],"PUFs":[31,51],"are":[32,39,97],"best":[33],"suited":[34],"because":[37],"they":[38],"able":[40,76],"to":[41,56,70,77,117,134,221],"generate":[42],"an":[43],"exponential":[44],"number":[45],"challenge-response-pairs":[47],"(CRPs).":[48],"However,":[49],"must":[52],"also":[53],"be":[54],"resilient":[55],"model-building":[57,120],"attacks.":[58],"Model-building":[59],"utilizes":[60],"machine":[61],"learning":[62],"algorithms":[63],"small":[66],"set":[67,213],"CRPs":[69],"build":[71],"model":[73],"that":[74,154,196],"is":[75,113,140,194,201,207],"predict":[78],"the":[79,87,100,106,123,127,135,171,179,189],"responses":[80],"fielded":[83],"chip,":[84],"thereby":[85],"compromising":[86],"security":[88],"chip-server":[90],"interactions.":[91],"In":[92],"this":[93,138],"paper,":[94],"response":[95],"bitstrings":[96,150],"eliminated":[98],"in":[99,122,161],"message":[101],"exchanges":[102],"between":[103,170],"chips":[104,160],"server":[107,136,146,185],"during":[108,203],"authentication,":[109],"therefore,":[111],"it":[112,155],"no":[114],"longer":[115],"possible":[116],"carry":[118],"out":[119],"attacks":[121],"traditional":[124],"manner.":[125],"Instead,":[126],"chip":[128,190],"transmits":[129],"Helper":[131,148,173,181],"Data":[132,149,174,182],"bitstring":[133,175],"information":[139],"used":[141],"instead.":[144],"The":[145,184,205],"constructs":[147],"using":[151,209],"enrollment":[152],"data":[153,210],"stores":[156],"all":[158],"valid":[159],"secure":[163],"database":[164],"computes":[166],"correlation":[167],"coefficients":[168],"(CCs)":[169],"chip\u2019s":[172],"each":[177],"server-generated":[180],"bitstrings.":[183],"authenticates":[186],"(and":[187],"identifies)":[188],"if":[191],"CC":[193],"found":[195],"exceeds":[197],"threshold,":[199],"which":[200],"determined":[202],"characterization.":[204],"technique":[206],"demonstrated":[208],"from":[211],"500":[215],"Xilinx":[216],"Zynq":[217],"7020":[218],"FPGAs,":[219],"subjected":[220],"industrial-level":[222],"temperature":[223],"voltage":[225],"variations.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
