I. Eichhorn, P. Koeberl, and V. Van-der-leest, Logically reconfigurable PUFs, Proceedings of the sixth ACM workshop on Scalable trusted computing, STC '11, pp.59-64, 2011.
DOI : 10.1145/2046582.2046594

K. Fruhashi, M. Shiozaki, A. Fukushima, T. Murayama, and T. Fujino, The arbiter-PUF with high uniqueness utilizing novel arbiter circuit with Delay-Time Measurement, 2011 IEEE International Symposium of Circuits and Systems (ISCAS), pp.2325-2328, 2011.
DOI : 10.1109/ISCAS.2011.5938068

B. Gassend, D. Clarke, M. Van-dijk, and S. Devadas, Controlled Physical Random Functions, IEEE Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC02), 2002.
DOI : 10.1007/978-1-84628-984-2_14

B. Gassend, D. Lim, D. Clarke, M. Van-dijk, and S. Devadas, Identification and authentication of integrated circuits, Concurrency and Computation: Practice and Experience, p.1610771098, 2004.
DOI : 10.1002/cpe.805

H. Handschuh, Hardware-Anchored Security Based on SRAM PUFs, Part 1. Security Privacy, IEEE, vol.10, issue.3, pp.80-83, 2012.
DOI : 10.1109/msp.2012.68

URL : https://www.cosic.esat.kuleuven.be/publications/article-2274.pdf

A. Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A. Sadeghi et al., Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs, Financial Cryptography and Data Security, pp.374-389, 2012.
DOI : 10.1007/978-3-642-32946-3_27

A. Kolberger, I. Schaumüller-bichl, V. Brunner, and M. Deutschmann, Protection Profile for PUF-Based Devices, Proceedings of the 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2014, pp.91-98, 2014.
DOI : 10.1007/978-3-642-55415-5_8

URL : https://hal.archives-ouvertes.fr/hal-01370357

R. Maes and I. Verbauwhede, Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp.3-37, 2010.
DOI : 10.1007/978-3-642-14452-3_1

M. Majzoobi, F. Koushanfar, and M. Potkonjak, Testing Techniques for Hardware Security, 2008 IEEE International Test Conference, pp.1-10, 2008.
DOI : 10.1109/TEST.2008.4700636

U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas et al., Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.237-249, 2010.

J. Sölter, Cryptanalysis of Electrical PUFs via Machine Learning Algorithms, 2009.