<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Platform Integration of Carbon-Nanotubes in Physical Unclonable Functions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Schmid</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Böttger</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Ernst</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Hartmann</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sascha Hermann</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elif Bilge Kavun</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff6">6</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Katzenbeisser</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Carbon-Nanotubes, Physical Unclonable Function, Field-Programmable Gate Array, Security Analysis</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Barkhausen Institut</institution>
          ,
          <addr-line>Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CPSWS'25: CPS Summer School PhD Workshop</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Center for Materials, Architectures and Integration of Nanomembranes, Chemnitz University of Technology</institution>
          ,
          <addr-line>Chemnitz</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Center for Micro and Nano Technologies, Chemnitz University of Technology</institution>
          ,
          <addr-line>Chemnitz</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Faculty of Computer Science and Mathematics, University of Passau</institution>
          ,
          <addr-line>Passau</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Fraunhofer Institute of Electric Nano Systems, Chemnitz University of Technology</institution>
          ,
          <addr-line>Chemnitz</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff6">
          <label>6</label>
          <institution>Institute of Systems Architecture, Dresden University of Technology</institution>
          ,
          <addr-line>Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>Physical Unclonable Functions (PUFs) have emerged as a suitable implementation of hardware-based trust anchors, enabling secure key storage, device authentication, and software protection. Continuing research and developments have led to elevated technology readiness and highlight the potential of carbon nanotube fieldefect transistors (CNTFETs) as the foundation for next-generation PUF architectures due to their high entropy, robustness, and thermal stability. In this work, we investigate 12×12 crossbar arrays composed of CNTFETs fabricated by scalable wafer-level manufacturing. We describe the measurement setup used to characterize the transistors and present the resulting electrical data. We analyze the impact of parasitic currents introduced by the interconnection of transistors' terminals, assessing their influence on the stability and reliability of the PUF response. Finally, we outline the design considerations and implementation constraints for interfacing the CNTFET matrix with an FPGA for digital readout, including an analysis of potential vulnerabilities introduced through this integration.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>CEUR
Workshop
ISSN1613-0073</p>
      <sec id="sec-1-1">
        <title>Source Pads Drain Pads</title>
        <p>GND</p>
      </sec>
      <sec id="sec-1-2">
        <title>Gate Pads</title>
        <p>A ID,agg
VDS
A ID,col
VDS
A I
G
VGS</p>
        <sec id="sec-1-2-1">
          <title>1.1. Problem statement</title>
          <p>
            To ease the measurement process by reducing the number of required contact pads, we embedded the
CNTFETs in an 12 × 12 on-wafer crossbar array, as illustrated in Figure 1. The CNTFETs are arranged
into 12 rows, where the source terminals are connected horizontally and the drain terminals vertically.
Further, the gate terminals of all CNTFETs are interconnected. The configuration shown on the left
in Figure 1 illustrates the selective measurement of a single CNTFET: one source pad is connected to
ground (GND), all other source and drain pads are biased to   . Then, the current  ,
the drain pad connected to the drain of the selected transistor is measured using an ammeter (A). To
lfowing into
derive a binary PUF response, a threshold is then chosen that uniformly groups the CNTFETs into a
lower-current (non-conducting) and higher-current (conducting) set [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ].
          </p>
          <p>
            In an ideal scenario, the gate terminal of a CNTFET would be perfectly electrically isolated from
its source and drain terminals. In practice, however, leakage currents can flow between the gate and
the source or drain. In the crossbar configuration, such leakage afects the measurement of
currents are drawn from, or flow into, the measured drain column. As a result, the separation between
conducting and non-conducting states in the individual CNTFETs becomes less distinct. While gate
leakage also occurs in isolated CNTFETs, in that case, the efect is confined to the probed transistor
and does not propagate through the array. In the interconnected crossbar, by contrast, the leakage
influences multiple measurement paths, complicating the design of a universal quantization scheme


when
based on a single threshold [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ].
          </p>
          <p>In this work, we evaluate leakage efects in the crossbar through comprehensive electrical
measurements, outline how to derive an equivalent resistive circuit model to analyse parasitic currents, and
present the future steps to improve the read-out architecture, including FPGA-based interfacing. The
main contributions of this work are as follows:
• Electrical characterization of CNTFETs implemented in a 12×12 on-wafer crossbar array, including
measurement of individual cell transfer characteristics and analysis of their behaviour within an
interconnected structure.
• Suggestion of a method to identify and localize parasitic currents in the crossbar interconnect
network, enabling diferentiation between leakage paths and intrinsic cell behaviour.
• Proposal of an FPGA-based read-out architecture employing a voltage-readout active switch
matrix, as outlined in the research plan, to facilitate scalable PUF evaluation and eventual
integration into dedicated ICs.</p>
        </sec>
        <sec id="sec-1-2-2">
          <title>1.2. Related Work</title>
          <p>
            Hu et al. [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ] fabricated a 2560 bit CNT-PUF which was constructed from fabricated 5x5 crossbar
structures. They derived both a binary and ternary PUF with a mean intra-device Hamming distance of
approximately 3%. Moon et al. [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ] present a PUF constructed from all-printed carbon nanotube (CNT)
networks. Rather than embedding individual CNTFETs into a crossbar, their design forms a network of
dispersed CNTs enclosed by electrodes.
          </p>
          <p>Practical system integration, such as into an FPGA-based platform, is still missing. We try to close this
gap by analyzing a readout concept that can be interfaced with standard analog-to-digital converters
(ADCs), enabling a more direct path toward integration into resource-constrained systems. While the
progress to date was obtained from passive crossbar arrays using precision source-measure units (SMUs),
the research plan outlines an active voltage-readout architecture currently in fabrication, designed to
mitigate leakage efects, simplify measurement circuitry, and support scalable on-chip evaluation.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>biased with   .</p>
      <p>To evaluate the electrical behaviour of the CNTFETs, we experimentally approximate their transfer
characteristics, i.e., the relationship between their intrinsic drain current   and the gate-source voltage</p>
      <p>at a constant drain-source voltage   . As the CNTFETs in the crossbar are not electrically isolated,
 cannot be measured directly; instead, we approximate it by the current  ,
lfowing into the
corresponding drain column. For each of the 144 CNTFETs in the 12 × 12 crossbar array, we record the
following quantities:
1. The electrical current  ,</p>
      <p>measured at the drain pad connected to the drain terminal of the
selected CNTFET including periphery when biased with   .
2. The aggregate drain-source current  , agg measured at all other source and drain pads when
3. The current   measured at the gate pads when biased with   .</p>
      <p>The transfer curve of the selected CNTFET derived from  ,
enables the assessment of its behaviour
under various quantization models, by picking the required values from the curve. The additional two
measurements provide insight into leakage currents propagated by the interconnected structure.</p>
      <p>
        Measurements are performed directly on on-wafer crossbar structures using a wafer probing station
equipped with a dedicated 28-needle probe card. All input/output lines are routed to a custom-built
switch matrix [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which selectively connects specific rows and columns of the crossbar to three precision
SMUs. This configuration enables automated characterization of all CNTFETs in the array without
repeated manual probe positioning, ensuring consistent measurement conditions across the dataset
while maintaining practical measurement times.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Progress to Date</title>
      <p>over  
To date, we have characterized CNTFETs in more than 100 diferent crossbar arrays using  
= ±0.5 V
∈ {2.0 V, 1.8 V, … , −2.0 V}, with a general current limit of 10 μA. The evaluated crossbars are
categorized according to their fabrication parameters; in the following, we present results obtained
from the arrays fabricated with the most promising parameter sets and that exhibit aforementioned
leakage efects in their crossbar.
the left-side plots corresponds to the  ,
row represents the  .</p>
      <p>Figure 2 summarizes the results for the configuration  
= −0.5 V and</p>
      <p>
        = ±2.0 V. Each row in
values measured for one crossbar, where each bar within a
measurement for one CNTFET. The measured currents predominantly range
from −200 nA to −0.1 nA. These results confirm the problem outlined in Section 1.1: while individually
probed CNTFETs exhibited a clear separation between the two states in our previous work [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], this
distinction in PUF response is much less pronounced in the crossbar configuration. This may be related
  , (A), Logarithmic Scale
  , (A), Logarithmic Scale
  = 2.0V
  = −2.0V
,
,

,
)
A
(


,
      </p>
      <p>currents for selected crossbars that exhibit leakage. In the left-hand scatter plots, each
row corresponds to one crossbar, and each bar within a row represents the  ,
value measured for a selected
CNTFET. A small number of currents lie outside of the displayed region (towards 0). The right-hand heatmaps
visualize the same measurements as color maps, enabling analysis of spatial correlations within each crossbar.
The upper plots show results for   = −2.0 V, while the lower plots show results for   = 2.0 V.
to the aforementioned leakage paths, which are assumed to scale with crossbar array size, complicating
distinctive response for the used 12x12 crossbars.</p>
      <p>Nonetheless, two distinct clusters can be observed for each structure, enabling the definition of a
threshold for almost stable quantization. Table 1 lists the percentage of CNTFETs classified as conducting
under various  ,</p>
      <p>thresholds, derived from the transfer characteristics shown in Figure 2. Among
the presented crossbars, the most stable quantization occurs at a threshold of approximately −6 nA
to −5 nA, where the change in the proportion between conducting versus non-conducting is minimal.
Crossbars A-C exhibit a strong bias toward non-conducting CNTFETs, while crossbar H is biased
toward conducting transistors. The remaining crossbars achieve an acceptable uniformity of around
45% conducting cells. Still, error-correcting measures such as cell selection would be required to achieve
perfect uniformity, thereby reducing the available PUF response width.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Plan of research</title>
      <sec id="sec-4-1">
        <title>4.1. Leakage localization via equivalent circuit modelling</title>
        <p>In order to analyse the leakage behaviour observed during measurements, the recorded current values
are used to mathematically derive an equivalent resistive circuit of the crossbar array for a given
(</p>
        <p>,   ) configuration. The resistances are approximated iteratively such that the simulated network
reproduces the experimentally measured currents. The equivalent circuit model provides a spatial
map of the array, highlighting cells that exhibit excessive gate leakage or short circuits between their
terminals. This could be an perspective standard proccess during enrollment of the PUF in order to
support cell selection for initial trimming and entropy improvement.</p>
        <p>As an illustrative example, Figure 3 shows a proof-of-concept simulation performed on a 2 × 2
subsection of the array. In this preliminary model, resistance values were adjusted manually to qualitatively
reflect leakage phenomena observed during measurements. It demonstrates how the equivalent circuit
approach can reveal abnormal leakage paths and localize them to specific cells and terminals. In the
minimal-leakage case (left), current flows through the measured CNTFET as well as through the other
CNTFETs in the grounded source row. In the leakage case (right), additional current from the gate flows
into the drain column, reversing the sign of  ,</p>
        <p>. Depending on the location of the gate leakage relative
to the measured CNTFET and the corresponding recorded values, these leakage paths can reliably be
identified.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Characterization of voltage-readout active switch matrix</title>
        <p>To enable crosstalk-free addressing of individual PUF cells, the passive crossbar structure will be
extended to an active matrix. In this design, the PUF circuitry is placed inside a cell activated by
thin-film FETs, allowing selective activation of individual CNTFETs. Further, it includes an adjustable
potentiometer that enables read out of voltages instead of currents. The goal is to distinguish an
additional state from the fully conducting and fully insulating states. This enables ternary response
extraction, which can increase the entropy per cell and provide a richer feature set for PUF evaluation.
The layout for this structure has already been finalized, and the corresponding wafers are currently in
fabrication.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. FPGA interfacing</title>
        <p>Building upon the voltage-readout active switch matrix described in the previous section, the analog
output voltages of the selected CNTFET cells will be digitized using an FPGA with integrated
multichannel ADCs. Within the FPGA, the digitized outputs will be processed to perform binary or ternary
GND
 
  ,
 
  ,


into the measured drain column. Yellow dotted arrows indicate the dominant current paths.
quantization. For binary quantization, a single threshold voltage will be applied to the digitized value.
For ternary quantization, the same CNTFET will be measured twice—once in the gate-on state and once
in the gate-of state and the resulting digitized valus compared. The FPGA-based approach serves as an
intermediate prototyping step toward eventual integration of the PUF into a dedicated IC.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Security evaluation</title>
        <p>
          In the final stage, the integrated PUF system will be subjected to a comprehensive security evaluation.
First, potential vulnerabilities to power analysis will be investigated. In particular, the efect of
electromagnetic (EM) emanations [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] from the read-out lines will be examined. In addition, we plan to
evaluate the susceptibility of the system to intentional EM injection attacks [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. These efects will be
compared for serial versus parallel read-out, as the latter might blend the individual states enough to
make an efective attack impossible.
        </p>
        <p>
          Beyond electrical side-channel analysis, optical probing via photon emission microscopy [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] will
be applied to the crossbar to detect localized switching activity that may reveal individual cell states.
Environmental stability will be assessed by measuring the PUF under controlled variations in
temperature and humidity to determine their impact on the analog outputs, quantized responses, and reliability
metrics.
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Critical Issues and Mitigation</title>
        <p>Fabrication delays, electrotechnical faults or lack of precise equipment may conflict with the desired
goals of the research. The voltage-readout active switch matrix may exhibit electrotechnical limitations,
such as leakage through the thin-film transistors. Further, the diferential between the output voltage
of conductive and non-conducting cells may be too minor to accurately be distinguished by the ADCs
in customer-grade FPGAs. Should this occur, an FPGA interface can still be designed and validated
under the assumption of a theoretical PUF that produces idealized output values. Similarly, the security
evaluation can be carried out on the readout circuitry in isolation, without requiring a fully functional
PUF.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This work addresses the challenge of reliably extracting PUF responses from CNTFETs integrated in an
12x12 interconnected crossbar array. While individually probed CNTFETs exhibit a clear distinction
between conducting and non-conducting states, measurements in the crossbar configuration revealed
reduced separation due to parasitic currents propagating through the shared wirings. In particular,
gate leakage in a single CNTFET can influence multiple measurement paths, altering the transfer
characteristics of neighbouring cells and degrading the quality of the derived PUF responses. In
response, we derived a new measurement procedure that additionally records the aggregate currents
lfowing to the non-selected drain and source pads of the crossbar array. This aids in identifying the
points of leakage inside the structures.</p>
      <p>The next intermediate milestone in this project is the implementation of a leakage-localization
method based on equivalent resistive circuit modelling, in parallel to the preparation of a measurement
setup for the voltage-readout active switch matrix currently in fabrication. These steps will provide
the foundation for evaluating improved read-out architectures and their integration with FPGA-based
processing in cyber-physical systems.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly and Chat-GPT4 and Chat-GPT5 for
sentence polishing. After using these tools, the authors reviewed and edited the content as needed and
take full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gassend</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. E.</given-names>
            <surname>Suh</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. Van Dijk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Devadas</surname>
          </string-name>
          ,
          <article-title>A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications</article-title>
          , in: 2004
          <source>Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525)</source>
          , IEEE,
          <year>2004</year>
          , pp.
          <fpage>176</fpage>
          -
          <lpage>179</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Skoric</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.-J.</given-names>
            <surname>Schrijen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Tuyls</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ignatenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Willems</surname>
          </string-name>
          ,
          <article-title>Secure Key Storage with PUFs, in: Security with Noisy Data: On Private Biometrics, Secure Key Storage</article-title>
          and
          <string-name>
            <surname>Anti-Counterfeiting</surname>
          </string-name>
          , Springer,
          <year>2008</year>
          , pp.
          <fpage>269</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Koushanfar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. K.</given-names>
            <surname>Pendyala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.-R.</given-names>
            <surname>Sadeghi</surname>
          </string-name>
          , C. Wachsmann,
          <source>PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs, in: Proceedings of the 51st Annual Design Automation Conference (DAC)</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Böttger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Frank</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Anagnostopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hartmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Arul</surname>
          </string-name>
          , S. Hermann, S. Katzenbeisser, CNT-PUFs:
          <article-title>Highly Robust Physical Unclonable Functions Based on Carbon Nanotubes</article-title>
          ,
          <source>in: 2023 IEEE 23rd International Conference on Nanotechnology (NANO)</source>
          , IEEE,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. M. M. L. Comeras</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Afzali</surname>
            ,
            <given-names>G. S.</given-names>
          </string-name>
          <string-name>
            <surname>Tulevski</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          <string-name>
            <surname>Hannon</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Liehr</surname>
          </string-name>
          , S.-J. Han,
          <string-name>
            <surname>Physically Unclonable Cryptographic Primitives Using Self-Assembled Carbon</surname>
            <given-names>Nanotubes</given-names>
          </string-name>
          ,
          <source>Nature Nanotechnology</source>
          <volume>11</volume>
          (
          <year>2016</year>
          )
          <fpage>559</fpage>
          -
          <lpage>565</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.-I.</given-names>
            <surname>Moon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rukhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Gandhiraman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-L. Seol</surname>
            ,
            <given-names>K. J.</given-names>
          </string-name>
          <string-name>
            <surname>Yoon</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Koehne</surname>
          </string-name>
          , J.-W. Han, et al.,
          <article-title>Physically Unclonable Function by an All-Printed Carbon Nanotube Network</article-title>
          ,
          <source>ACS Applied Electronic Materials</source>
          <volume>1</volume>
          (
          <year>2019</year>
          )
          <fpage>1162</fpage>
          -
          <lpage>1168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Frank</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Anagnostopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Böttger</surname>
          </string-name>
          , S. Hermann, T. Arul,
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Stavrinides</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Katzenbeisser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Dedicated</given-names>
            <surname>Mixed-Signal Characterisation</surname>
          </string-name>
          and
          <article-title>Testing Framework for Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical Unclonable Functions</article-title>
          ,
          <source>in: 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)</source>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Archambeault</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rohatgi</surname>
          </string-name>
          ,
          <article-title>The EM Side-Channel(s)</article-title>
          ,
          <source>in: International Workshop on Cryptographic Hardware and Embedded Systems (CHES)</source>
          , Springer,
          <year>2002</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Wan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Duval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Savatier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Louis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mazari</surname>
          </string-name>
          ,
          <article-title>Efects of Conducted Electromagnetic Interference on Analogue-to-</article-title>
          <string-name>
            <surname>Digital</surname>
            <given-names>Converter</given-names>
          </string-name>
          ,
          <source>Electronics Letters</source>
          <volume>47</volume>
          (
          <year>2011</year>
          )
          <fpage>23</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Nedospasov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-P.</given-names>
            <surname>Seifert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Helfmeier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Boit</surname>
          </string-name>
          ,
          <article-title>Invasive PUF Analysis</article-title>
          ,
          <source>in: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</source>
          , IEEE,
          <year>2013</year>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>