Related references
Note: Only part of the references are listed.Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Urbi Chatterjee et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
A Reliable Strong PUF Based on Switched-Capacitor Circuit
Zhangqing He et al.
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2018)
Cherry-Picking Reliable PUF Bits With Differential Sequence Coding
Matthias Hiller et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
Jeroen Delvaux et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)
Secure and Robust Error Correction for Physical Unclonable Functions
Meng-Day (Mandel) Yu et al.
IEEE DESIGN & TEST OF COMPUTERS (2010)
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis et al.
SIAM JOURNAL ON COMPUTING (2008)