F. Armknecht, R. Maes, A. R. Sadeghi, F. X. Standaert, and C. Wachsmann, A formalization of the security features of physical functions, Security and Privacy (SP), 2011 IEEE Symposium on, pp.397-412, 2011.

L. Bolotnyy and G. Robins, Physically unclonable function-based security and privacy in RFID systems, Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications. pp. 211220. PERCOM '07, 2007.


M. Delavar, S. Mirzakuchaki, and J. Mohajeri, A ring oscillator-based PUF with enhanced challenge-response pairs, Canadian Journal of Electrical and Computer Engineering, vol.39, issue.2, pp.174-180, 2016.

I. Eichhorn, P. Koeberl, and V. Van-der-leest, Logically reconfigurable PUFs: Memory-based secure key storage, Proceedings of the Sixth ACM Workshop on Scalable Trusted Computing, pp.59-64, 2011.

B. Gassend, D. Clarke, M. Van-dijk, and S. Devadas, Silicon physical random functions, Proceedings of the 9th ACM conference on Computer and communications security, pp.148-160, 2002.

G. Hospodar, R. Maes, and I. Verbauwhede, Machine learning attacks on 65nm arbiter PUFs: Accurate modeling poses strict bounds on usability, pp.37-42, 2012.

H. Krawczyk, R. Canetti, and M. Bellare, HMAC: Keyed-hashing for message, 1997.

J. G. Myers, SMTP service extension for authentication RFC 2195, 1999.

R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Physical one-way functions, Science, vol.297, issue.5589, pp.2026-2030, 2002.

U. Rührmair, H. Busch, and S. Katzenbeisser, Strong PUFs: models, constructions, and security proofs. In: Towards hardware-intrinsic security, pp.79-96, 2010.

U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas et al., Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM conference on Computer and communications security, pp.237-249, 2010.

P. Simons, E. Van-der-sluis, and V. Van-der-leest, Buskeeper PUFs, a promising alternative to D flip-flop PUFs, Hardware-Oriented Security and Trust (HOST), 2012 IEEE International Symposium on, pp.7-12, 2012.

G. E. Suh and S. Devadas, Physical unclonable functions for device authentication and secret key generation, Proceedings of the 44th annual Design Automation Conference, pp.9-14, 2007.