{"version":"1.0","provider_name":"CESI LINEACT","provider_url":"https:\/\/lineact.cesi.fr\/en\/","author_name":"Webmaster","author_url":"https:\/\/lineact.cesi.fr\/en\/cv-chercheurs\/plecostomus\/","title":"A Low-Cost Authentication Protocol Using Arbiter-PUF - CESI LINEACT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bbcEacbV2G\"><a href=\"https:\/\/lineact.cesi.fr\/en\/publications\/a-low-cost-authentication-protocol-using-arbiter-puf\/\">A Low-Cost Authentication Protocol Using Arbiter-PUF<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lineact.cesi.fr\/en\/publications\/a-low-cost-authentication-protocol-using-arbiter-puf\/embed\/#?secret=bbcEacbV2G\" width=\"600\" height=\"338\" title=\"&#8220;A Low-Cost Authentication Protocol Using Arbiter-PUF&#8221; &#8212; CESI LINEACT\" data-secret=\"bbcEacbV2G\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Integrated Circuits (ICs) and electronic devices become part of human daily life (mobile, home, car, etc) and for the safety of the information transported to and from this devices, some specifics security measures are proposed. Some ICs are a source of high randomness due to the manufacturing variation of integrated Circuits (ICs) and exploited as [&hellip;]"}