{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T03:44:43Z","timestamp":1773200683049,"version":"3.50.1"},"reference-count":140,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R &amp; D Program of China","award":["2019YFB1310001"],"award-info":[{"award-number":["2019YFB1310001"]}]},{"name":"National Key R &amp; D Program of China","award":["62274056"],"award-info":[{"award-number":["62274056"]}]},{"name":"National Key R &amp; D Program of China","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}]},{"name":"National Key R &amp; D Program of China","award":["2021K605C"],"award-info":[{"award-number":["2021K605C"]}]},{"name":"National Key R &amp; D Program of China","award":["U20A20202"],"award-info":[{"award-number":["U20A20202"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019YFB1310001"],"award-info":[{"award-number":["2019YFB1310001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62274056"],"award-info":[{"award-number":["62274056"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2021K605C"],"award-info":[{"award-number":["2021K605C"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20202"],"award-info":[{"award-number":["U20A20202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["2019YFB1310001"],"award-info":[{"award-number":["2019YFB1310001"]}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["62274056"],"award-info":[{"award-number":["62274056"]}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["2021K605C"],"award-info":[{"award-number":["2021K605C"]}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["U20A20202"],"award-info":[{"award-number":["U20A20202"]}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2019YFB1310001"],"award-info":[{"award-number":["2019YFB1310001"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["62274056"],"award-info":[{"award-number":["62274056"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2021K605C"],"award-info":[{"award-number":["2021K605C"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["U20A20202"],"award-info":[{"award-number":["U20A20202"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["2019YFB1310001"],"award-info":[{"award-number":["2019YFB1310001"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["62274056"],"award-info":[{"award-number":["62274056"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["2021K605C"],"award-info":[{"award-number":["2021K605C"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["U20A20202"],"award-info":[{"award-number":["U20A20202"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["2019YFB1310001"],"award-info":[{"award-number":["2019YFB1310001"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["62274056"],"award-info":[{"award-number":["62274056"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["2021K605C"],"award-info":[{"award-number":["2021K605C"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["U20A20202"],"award-info":[{"award-number":["U20A20202"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Entropy is a measure of uncertainty or randomness. It is the foundation for almost all cryptographic systems. True random number generators (TRNGs) and physical unclonable functions (PUFs) are the silicon primitives to respectively harvest dynamic and static entropy to generate random bit streams. In this survey paper, we present a systematic and comprehensive review of different state-of-the-art methods to harvest entropy from silicon-based devices, including the implementations, applications, and the security of the designs. Furthermore, we conclude the trends of the entropy source design to point out the current spots of entropy harvesting.<\/jats:p>","DOI":"10.3390\/e24111566","type":"journal-article","created":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T07:26:50Z","timestamp":1667114810000},"page":"1566","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Entropy Sources Based on Silicon Chips: True Random Number Generator and Physical Unclonable Function"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5227-2241","authenticated-orcid":false,"given":"Yuan","family":"Cao","sequence":"first","affiliation":[{"name":"College of Internet of Things Engineering, Hohai University, Changzhou 213022, China"},{"name":"Rock-Solid Security Lab., Binary Semiconductor Co., Ltd., Suzhou 215000, China"}]},{"given":"Wanyi","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Internet of Things Engineering, Hohai University, Changzhou 213022, China"},{"name":"Rock-Solid Security Lab., Binary Semiconductor Co., Ltd., Suzhou 215000, China"}]},{"given":"Lan","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Internet of Things Engineering, Hohai University, Changzhou 213022, China"},{"name":"Rock-Solid Security Lab., Binary Semiconductor Co., Ltd., Suzhou 215000, China"}]},{"given":"Bingqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China"},{"name":"Wuhan National Laboratory of Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2012-0424","authenticated-orcid":false,"given":"Shuai","family":"Chen","sequence":"additional","affiliation":[{"name":"Rock-Solid Security Lab., Binary Semiconductor Co., Ltd., Suzhou 215000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8023-5090","authenticated-orcid":false,"given":"Jing","family":"Ye","sequence":"additional","affiliation":[{"name":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing 100190, China"}]},{"given":"Xianzhao","family":"Xia","sequence":"additional","affiliation":[{"name":"China Automotive Technology and Research Center Co., Ltd., Tianjin 300300, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7460-7628","authenticated-orcid":false,"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China"},{"name":"Wuhan National Laboratory of Optoelectronics, Huazhong University of Science and Technology, Wuhan 430074, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A Mathematical Theory of Communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MC.2014.47","article-title":"The Importance of Entropy to Information Security","volume":"47","author":"Vassilev","year":"2014","journal-title":"Computer"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2431","DOI":"10.1109\/TCAD.2021.3096464","article-title":"A Lightweight Full Entropy TRNG with On-Chip Entropy Assurance","volume":"40","author":"Chen","year":"2021","journal-title":"IEEE Trans.-Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Prada-Delgado, M.A., Mart\u00ednez-G\u00f3mez, C., and Baturone, I. (2020, January 12\u201314). Auto-Calibrated Ring Oscillator TRNG Based on Jitter Accumulation. Proceedings of the 2020 IEEE International Symposium on Circuits and Systems (ISCAS), Seville, Spain.","DOI":"10.1109\/ISCAS45731.2020.9180598"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2280","DOI":"10.1109\/TVLSI.2020.3011648","article-title":"Unified Analog PUF and TRNG Based on Current-Steering DAC and VCO","volume":"28","author":"Danesh","year":"2020","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_6","unstructured":"Viega, J., and Messier, M. (2003). Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More, O\u2019Reilly Media."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.cjph.2017.11.008","article-title":"A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules","volume":"56","author":"Hasan","year":"2018","journal-title":"Chin. J. Phys."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.nancom.2018.04.001","article-title":"A novel true random number generator based on QCA nanocomputing","volume":"17","author":"Abutaleb","year":"2018","journal-title":"Nano Commun. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Barker, E.B., and Kelsey, J.M. (2007). Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised), US Department of Commerce, Technology Administration, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-90r"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Suh, G.E., and Devadas, S. (2007, January 4\u20138). Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the 2007 44th ACM\/IEEE Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375043"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Maiti, A., Casarona, J., McHale, L., and Schaumont, P. (2010, January 13\u201314). A large scale characterization of RO-PUF. Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA.","DOI":"10.1109\/HST.2010.5513108"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TC.2008.212","article-title":"Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers","volume":"58","author":"Holcomb","year":"2009","journal-title":"IEEE Trans. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhu, L., Huang, M., Chen, Z., Chen, S., and Li, B. (2019, January 19\u201321). Racing APUF: A Novel APUF against Machine Learning Attack with High Reliability. Proceedings of the 2019 IEEE 4th International Conference on Signal and Image Processing (ICSIP), Wuxi, China.","DOI":"10.1109\/SIPROCESS.2019.8868387"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chen, S., Xiong, W., Xu, Y., Li, B., and Szefer, J. (2019, January 5\u20138). Thermal Covert Channels Leveraging Package-on-Package DRAM. Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), Rotorua, New Zealand.","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00050"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Yilmaz, Y., Gunn, S.R., and Halak, B. (2018, January 2\u20134). Lightweight PUF-Based Authentication Protocol for IoT Devices. Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Costa Brava, Spain.","DOI":"10.1109\/IVSW.2018.8494884"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Al-Meer, A., and Al-Kuwari, S. (2022). Physical Unclonable Functions (PUF) for IoT Devices. arXiv.","DOI":"10.1145\/3591464"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3458824","article-title":"A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems","volume":"17","author":"Mexis","year":"2021","journal-title":"Acm J. Emerg. Technol. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chen, S., Li, B., Chen, Z., Zhang, Y., Wang, C., and Tao, C. (2021). Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir\u2019s Secret Sharing. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2021.3065836"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1109\/TVLSI.2020.2975876","article-title":"A Compact Low-Voltage True Random Number Generator Based on Inkjet Printing Technology","volume":"28","author":"Erozan","year":"2020","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2473","DOI":"10.1109\/TVLSI.2019.2927816","article-title":"An Asynchronous and Low-Power True Random Number Generator using STT-MTJ","volume":"27","author":"Perach","year":"2019","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Gutierrez, S.V. (2022, January 23\u201327). Memristor-based security primitives. Proceedings of the 2022 IEEE European Test Symposium (ETS), Barcelona, Spain.","DOI":"10.1109\/ETS54262.2022.9810403"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Srinivasu, B., and Chattopadhyay, A. (2021, January 28\u201330). Cycle PUF: A Cycle operator based PUF in Carbon Nanotube FET Technology. Proceedings of the 2021 IEEE 21st International Conference on Nanotechnology (NANO), Montreal, QC, Canada.","DOI":"10.1109\/NANO51122.2021.9514291"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Vatajelu, E.I., Di Natale, G., Indaco, M., and Prinetto, P. (2015, January 9\u201313). STT MRAM-based PUFs. Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.7873\/DATE.2015.0505"},{"key":"ref_24","unstructured":"Yu, B. (September, January 30). Tutorial: Information theory and statistics. Proceedings of the 7th International Conference on Machine Learning and Applications, San Diego, CA, USA."},{"key":"ref_25","unstructured":"Caelli, W. (1992). Crypt X Package Documentation, Information Security Research Centre and School of Mathematics, Queensland University of Technology."},{"key":"ref_26","unstructured":"Walker, J. (2008, January 28). ENT: A Pseudorandom Number Sequence Test Program. Available online: https:\/\/www.fourmilab.ch\/random\/."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"L\u2019Ecuyer, P., and Simard, R. (2007). TestU01: A C Library for Empirical Testing of Random Number Generators. ACM Trans. Math. Softw., 33.","DOI":"10.1145\/1268776.1268777"},{"key":"ref_28","unstructured":"Brown, R.G., Eddelbuettel, D., and Bauer, D. (2022, September 26). Dieharder: A Random Number Test Suite. Available online: http:\/\/webhome.phy.duke.edu\/~rgb\/General\/dieharder.php."},{"key":"ref_29","unstructured":"Bassham, L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., and Banks, D.L. (2010, April 30). SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-22\/rev-1a\/final."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Datta, D., Datta, B., and Dutta, H.S. (2017, January 23\u201324). Design and implementation of multibit LFSR on FPGA to generate pseudorandom sequence number. Proceedings of the 2017 Devices for Integrated Circuit (DevIC), Kalyani, India.","DOI":"10.1109\/DEVIC.2017.8073966"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Li, W., and Yang, X. (2015, January 26\u201327). A Parallel and Reconfigurable United Architecture for Fibonacci and Galois LFSR. Proceedings of the 2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics, Hangzhou, China.","DOI":"10.1109\/IHMSC.2015.265"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kiruthiga, S., Shangeeth, M., Kumar S.P., R., and Sowndarya, R. (2020, January 6\u20137). LFSR using CDFF and GDI. Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS48705.2020.9074155"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Oommen, R., George, M.K., and Joseph, S. (2018, January 21\u201322). Study and Analysis of Various LFSR Architectures. Proceedings of the 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET), Kottayam, India.","DOI":"10.1109\/ICCSDET.2018.8821227"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Akhila, N., Kumari, C.U., Swathi, K., Padma, T., and Kora, P. (2021, January 2\u20134). Implementation of Modified Dual-Coupled Linear Congruential Generator in Data Encryption Standard Algorithm. Proceedings of the 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India.","DOI":"10.1109\/ICIRCA51532.2021.9544633"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Akhila, N., Kumari, C.U., Swathi, K., Padma, T., and Rao, N.M. (2021, January 25\u201327). Performance Analysis of Pseudo Random Bit Generator Using Modified Dual-Coupled Linear Congruential Generator. Proceedings of the 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India.","DOI":"10.1109\/CONIT51480.2021.9498354"},{"key":"ref_36","unstructured":"Peng, T., Xin Yi, X., Xu, K., and Feng Hu, L. (2011, January 25\u201328). Linear congruential interleaves design for IDMA system. Proceedings of the 2011 IEEE 13th International Conference on Communication Technology, Jinan, China."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Barker, E., and Kelsey, J. (2015). SP 800-90A Rev. 1\u2014Recommendation for Random Number Generation Using Deterministic Random Bit Generators, NIST. Technical Report.","DOI":"10.6028\/NIST.SP.800-90Ar1"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1982, January 3\u20135). Theory and application of trapdoor functions. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), Chicago, IL, USA.","DOI":"10.1109\/SFCS.1982.45"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J. (2015, August 04). FIPS PUB 202 - SHA3 Standard: Permutation-Based Hash and Extendable-Output Functions, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/fips\/202\/final.","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Kumar, A., and Arora, V. (2015, January 20). Analyzing the performance and security by using SHA3 in WEP. Proceedings of the 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, India.","DOI":"10.1109\/ICETECH.2015.7275026"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1063\/1.3140429","article-title":"Low-Frequency Noise in Electronic Devices\u2014Past, Present and Future","volume":"1129","author":"Deen","year":"2009","journal-title":"AIP Conf. Proc."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.sse.2014.03.002","article-title":"Evolution of low frequency noise and noise variability through CMOS bulk technology nodes from 0.5 \u03bcm down to 20 nm","volume":"95","author":"Ioannidis","year":"2014","journal-title":"Solid-State Electron."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Ioannidis, E.G., Haendler, S., Bajolet, A., Rosa, J., Manceau, J.P., Dimitriadis, C.A., and Ghibaudo, G. (2013, January 24\u201328). Evolution of low frequency noise and noise variability through CMOS bulk technology nodes. Proceedings of the 2013 22nd International Conference on Noise and Fluctuations (ICNF), Montpellier, France.","DOI":"10.1109\/ICNF.2013.6578985"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2310","DOI":"10.1109\/TED.2011.2141139","article-title":"Low-Frequency Noise Investigation and Noise Variability Analysis in High- k\/Metal Gate 32-nm CMOS Transistors","volume":"58","author":"Lopez","year":"2011","journal-title":"IEEE Trans. Electron Devices"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1109\/81.915396","article-title":"Chaos-based random number generators. Part II: Practical realization","volume":"48","author":"Stojanovski","year":"2001","journal-title":"IEEE Trans. Circuits Syst. Fundam. Theory Appl."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"3124","DOI":"10.1109\/TCSI.2010.2052515","article-title":"Implementation and Testing of High-Speed CMOS True Random Number Generators Based on Chaotic Systems","volume":"57","author":"Pareschi","year":"2010","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/JSSC.2017.2694833","article-title":"A 82-nW Chaotic Map True Random Number Generator Based on a Sub-Ranging SAR ADC","volume":"52","author":"Kim","year":"2017","journal-title":"IEEE J.-Solid-State Circuits"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Han, L., Cao, Y., Qian, L., Xie, H., and Chang, C.H. (2021, January 16\u201318). An Ultra-Low Power 3-T Chaotic Map based True Random Number Generator. Proceedings of the 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Shanghai, China.","DOI":"10.1109\/AsianHOST53231.2021.9699781"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4970","DOI":"10.1109\/TCSI.2020.3019030","article-title":"A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology","volume":"67","author":"Luo","year":"2020","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1109\/JSSC.2006.876206","article-title":"Phase Noise and Jitter in CMOS Ring Oscillators","volume":"41","author":"Abidi","year":"2006","journal-title":"IEEE J.-Solid-State Circuits"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TCSI.2013.2283993","article-title":"Modeling CMOS Ring Oscillator Performance as a Randomness Source","volume":"61","author":"Guler","year":"2014","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Cao, Y., Chang, C.H., Zheng, Y., and Zhao, X. (2017, January 19\u201320). An energy-efficient true random number generator based on current starved ring oscillators. Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Beijing, China.","DOI":"10.1109\/AsianHOST.2017.8353992"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Kumar, D., Anand, R., and Goswami, M. (2020, January 19\u201322). A 138 Mbps jitter based power efficient true random number generator. Proceedings of the 2020 International Conference on Electronics, Information, and Communication (ICEIC), Barcelona, Spain.","DOI":"10.1109\/ICEIC49074.2020.9152937"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/JSSC.2007.910965","article-title":"True Random Number Generator With a Metastability-Based Quality Control","volume":"43","author":"Tokunaga","year":"2008","journal-title":"IEEE J.-Solid-State Circuits"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1109\/JSSC.2008.920327","article-title":"A 3 \u03bcW CMOS True Random Number Generator With Adaptive Floating-Gate Offset Cancellation","volume":"43","author":"Holleman","year":"2008","journal-title":"IEEE J.-Solid-State Circuits"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Srinivasan, S., Mathew, S., Erraguntla, V., and Krishnamurthy, R. (2009, January 5\u20139). A 4Gbps 0.57pJ\/bit Process-Voltage-Temperature Variation Tolerant All-Digital True Random Number Generator in 45 nm CMOS. Proceedings of the 2009 22nd International Conference on VLSI Design, New Delhi, India.","DOI":"10.1109\/VLSI.Design.2009.69"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/TCSI.2013.2265952","article-title":"Dual-Metastability Time-Competitive True Random Number Generator","volume":"61","author":"Wieczorek","year":"2014","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1109\/81.847868","article-title":"A noise-based IC random number generator for applications in cryptography","volume":"47","author":"Petrie","year":"2000","journal-title":"IEEE Trans. Circuits Syst. Fundam. Theory Appl."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/JSSC.2016.2625341","article-title":"3-Gb\/s High-Speed True Random Number Generator Using Common-Mode Operating Comparator and Sampling Uncertainty of D Flip-Flop","volume":"52","author":"Bae","year":"2017","journal-title":"IEEE J.-Solid-State Circuits"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Yang, J., Ding, Q., Gong, T., Luo, Q., Xue, X., Gao, Z., Yu, H., Yu, J., Xu, X., and Yuan, P. (2020, January 16\u201319). Robust True Random Number Generator using Stochastic Short-Term Recovery of Charge Trapping FinFET for Advanced Hardware Security. Proceedings of the 2020 IEEE Symposium on VLSI Technology, Honolulu, HI, USA.","DOI":"10.1109\/VLSITechnology18217.2020.9265048"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1109\/TCSI.2022.3158022","article-title":"TROT: A Three-Edge Ring Oscillator Based True Random Number Generator With Time-to-Digital Conversion","volume":"69","author":"Verbauwhede","year":"2022","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"2498","DOI":"10.1109\/JSSC.2021.3137312","article-title":"A 0.186-pJ per Bit Latch-Based True Random Number Generator Featuring Mismatch Compensation and Random Noise Enhancement","volume":"57","author":"Zhang","year":"2022","journal-title":"IEEE J.-Solid-State Circuits"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/TVLSI.2018.2804258","article-title":"DVFT: A Lightweight Solution for Power-Supply Noise-Based TRNG Using Dynamic Voltage Feedback Tuning System","volume":"26","author":"Tehranipoor","year":"2018","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0167-2789(90)90169-P","article-title":"Aperiodicity in one-dimensional cellular automata","volume":"45","author":"Jen","year":"1990","journal-title":"Phys. Nonlinear Phenom."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"108482","DOI":"10.1109\/ACCESS.2020.3000231","article-title":"Jitter-Quantizing-Based TRNG Robust Against PVT Variations","volume":"8","author":"Lu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Gruji\u0107, M., Ro\u017ei\u0107, V., Yang, B., and Verbauwhede, I. (2018, January 27\u201330). A Closer Look at the Delay-Chain based TRNG. Proceedings of the 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy.","DOI":"10.1109\/ISCAS.2018.8351222"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Lacharme, P. (2008). Post-Processing Functions for a Biased Physical Random Number Generator. Fast Software Encryption, Springer.","DOI":"10.1007\/978-3-540-71039-4_21"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/TC.2006.164","article-title":"New Methods for Digital Generation and Postprocessing of Random Data","volume":"55","author":"Golic","year":"2006","journal-title":"IEEE Trans. Comput."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1002\/rsa.20207","article-title":"How to get more mileage from randomness extractors","volume":"33","author":"Shaltiel","year":"2008","journal-title":"Random Struct. Algorithms"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1364\/OL.36.001020","article-title":"Scalable parallel physical random number generator based on a superluminescent LED","volume":"36","author":"Li","year":"2011","journal-title":"Opt. Lett."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Tkacik, T.E. (2002, January 13\u201315). A Hardware Random Number Generator. Proceedings of the Cryptographic Hardware and Embedded Systems\u2014CHES 2002, Redwood Shores, CA, USA.","DOI":"10.1007\/3-540-36400-5_32"},{"key":"ref_72","first-page":"3","article-title":"Various techniques used in connection with random digits","volume":"12","year":"1951","journal-title":"Appl. Math. Ser."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TC.2007.250627","article-title":"A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks","volume":"56","author":"Sunar","year":"2007","journal-title":"IEEE Trans. Comput."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s13389-015-0113-2","article-title":"Fault model of electromagnetic attacks targeting ring oscillator-based true random number generators","volume":"6","author":"Bayon","year":"2016","journal-title":"J. Cryptogr. Eng."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"5240","DOI":"10.1109\/JIOT.2021.3109917","article-title":"Attacking the Edge-of-Things: A Physical Attack Perspective","volume":"9","author":"Gai","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Bayon, P., Bossuet, L., Aubert, A., Fischer, V., Poucheret, F., Robisson, B., and Maurine, P. (2012). Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator. Constructive Side-Channel Analysis and Secure Design, Springer.","DOI":"10.1007\/978-3-642-29912-4_12"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Markettos, A.T., and Moore, S.W. (2009). The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/978-3-642-04138-9_23"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"1710","DOI":"10.1109\/TCSII.2021.3066338","article-title":"Can Deep Learning Break a True Random Number Generator?","volume":"68","author":"Yu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Express Briefs"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Tang, Q., Kim, B., Lao, Y., Parhi, K.K., and Kim, C.H. (2014, January 15\u201317). True Random Number Generator circuits based on single- and multi-phase beat frequency detection. Proceedings of the IEEE 2014 Custom Integrated Circuits Conference, San Jose, CA, USA.","DOI":"10.1109\/CICC.2014.6946136"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Bahadur, V., Selvakumar, D., and Sobha, P.M. (2016, January 10\u201312). Reconfigurable side channel attack resistant true random number generator. Proceedings of the 2016 International Conference on VLSI Systems, Architectures, Technology and Applications (VLSI-SATA), Bengaluru, India.","DOI":"10.1109\/VLSI-SATA.2016.7593048"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Yang, B., Ro\u017ei\u0107, V., Mentens, N., Dehaene, W., and Verbauwhede, I. (2016, January 14\u201318). TOTAL: TRNG on-the-fly testing for attack detection using Lightweight hardware. Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.3850\/9783981537079_0284"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Ebrahimabadi, M., Younis, M., Lalouani, W., and Karimi, N. (2021, January 20\u201324). A Novel Modeling-Attack Resilient Arbiter-PUF Design. Proceedings of the 2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID), Guwahati, India.","DOI":"10.1109\/VLSID51830.2021.00026"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Maes, R., and Verbauwhede, I. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Information Security and Cryptography, Springer.","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"3138","DOI":"10.1109\/TCSI.2017.2729941","article-title":"ACRO-PUF: A Low-power, Reliable and Aging-Resilient Current Starved Inverter-Based Ring Oscillator Physical Unclonable Function","volume":"64","author":"Liu","year":"2017","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Paillier, P., and Verbauwhede, I. (2007, January 10\u201313). FPGA Intrinsic PUFs and Their Use for IP Protection. Proceedings of the Cryptographic Hardware and Embedded Systems\u2014CHES 2007, Vienna, Austria.","DOI":"10.1007\/978-3-540-74735-2"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"104844","DOI":"10.1016\/j.mejo.2020.104844","article-title":"Design and implementation of robust and low-cost SRAM PUF using PMOS and linear shift register extractor","volume":"103","author":"Gong","year":"2020","journal-title":"Microelectron. J."},{"key":"ref_87","unstructured":"Lee, J., Lim, D., Gassend, B., Suh, G., van Dijk, M., and Devadas, S. (2004, January 17\u201319). A technique to build a secret key in integrated circuits for identification and authentication applications. Proceedings of the 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525), Honolulu, HI, USA."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1109\/TCSII.2019.2943121","article-title":"0.3 pJ\/Bit Machine Learning Resistant Strong PUF Using Subthreshold Voltage Divider Array","volume":"67","author":"Venkatesh","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Express Briefs"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Amsaad, F., Razaque, A., Baza, M., Kose, S., Bhatia, S., and Srivastava, G. (2021, January 14\u201323). An Efficient and Reliable Lightweight PUF for IoT-based Applications. Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada.","DOI":"10.1109\/ICCWorkshops50388.2021.9473510"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"K\u00f6m\u00fcrc\u00fc, G., Pusane, A.E., and D\u00fcndar, G. (2014, January 14\u201317). Robust RO-PUFs with enhanced challenge-response set. Proceedings of the 2014 11th\nInternational Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Nakhon Ratchasima, Thailand.","DOI":"10.1109\/ECTICon.2014.6839708"},{"key":"ref_91","unstructured":"Holcomb, D.E., Burleson, W.P., and Fu, K. (2022, August 31). Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. Available online: https:\/\/spqrlab1.github.io\/papers\/holcomb-FERNS-RFIDSec07.pdf."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., and Otis, B. (2007, January 11\u201315). A 1.6pJ\/bit 96% Stable Chip-ID Generating Circuit using Process Variations. Proceedings of the 2007 IEEE International Solid-State Circuits Conference, San Francisco, CA, USA.","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1109\/TCSI.2019.2945247","article-title":"A Strong Subthreshold Current Array PUF Resilient to Machine Learning Attacks","volume":"67","author":"Zhuang","year":"2020","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Liu, K., Fu, Z., Li, G., Pu, H., Guan, Z., Wang, X., Chen, X., and Shinohara, H. (2021, January 13\u201322). 36.3 A Modeling Attack Resilient Strong PUF with Feedback-SPN Structure Having <0.73% Bit Error Rate Through In-Cell Hot-Carrier Injection Burn-In. Proceedings of the 2021 IEEE International Solid- State Circuits Conference (ISSCC), San Francisco, CA, USA.","DOI":"10.1109\/ISSCC42613.2021.9365942"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhang, J., Law, M.K., Jiang, Y., Zhao, X., Mak, P.I., and Martins, R.P. (2021, January 7\u201310). Modeling Attack Resistant Strong PUF Exploiting Obfuscated Interconnections with <0.83% Bit-Error Rate. Proceedings of the 2021 IEEE Asian Solid-State Circuits Conference (A-SSCC), Busan, Korea.","DOI":"10.1109\/A-SSCC53895.2021.9634729"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1109\/TVLSI.2013.2279875","article-title":"The Impact of Aging on a Physical Unclonable Function","volume":"22","author":"Maiti","year":"2014","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Wang, R., Selimis, G., Maes, R., and Goossens, S. (2020, January 9\u201313). Long-term Continuous Assessment of SRAM PUF and Source of Random Numbers. Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.23919\/DATE48585.2020.9116353"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Mispan, M.S., Halak, B., Chen, Z., and Zwolinski, M. (July, January 29). TCO-PUF: A subthreshold physical unclonable function. Proceedings of the 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME), Glasgow, UK.","DOI":"10.1109\/PRIME.2015.7251345"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Mispan, M.S., Halak, B., and Zwolinski, M. (2016, January 4\u20136). NBTI aging evaluation of PUF-based differential architectures. Proceedings of the 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), Sant Feliu de Guixols, Spain.","DOI":"10.1109\/IOLTS.2016.7604680"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Garg, A., and Kim, T.T. (2014, January 1\u20135). Design of SRAM PUF with improved uniformity and reliability utilizing device aging effect. Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, Australia.","DOI":"10.1109\/ISCAS.2014.6865541"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TCSI.2017.2766073","article-title":"On Enhancing Reliability of Weak PUFs via Intelligent Post-Silicon Accelerated Aging","volume":"65","author":"Islam","year":"2018","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Zalivaka, S.S., Ivaniuk, A.A., and Chang, C.H. (2017, January 28\u201331). Low-cost fortification of arbiter PUF against modeling attack. Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA.","DOI":"10.1109\/ISCAS.2017.8050671"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"\u00fchrmair, U.R., Sehnke, F., \u00f6lter, J.S., Dror, G., Devadas, S., and \u00fcrgen Schmidhuber, J. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the CCS \u201910: 17th ACM Conference on Computer and Communications Security 2010, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Khalafalla, M., and Gebotys, C. (2019, January 25\u201329). PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy.","DOI":"10.23919\/DATE.2019.8714862"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Aseeri, A.O., Zhuang, Y., and Alkatheiri, M.S. (2018, January 2\u20137). A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things. Proceedings of the 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, USA.","DOI":"10.1109\/ICIOT.2018.00014"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TNANO.2010.2049367","article-title":"Applications of High-Capacity Crossbar Memories in Cryptography","volume":"10","author":"Jaeger","year":"2011","journal-title":"IEEE Trans. Nanotechnol."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Ebrahimabadi, M., Lalouani, W., Younis, M., and Karimi, N. (2021, January 7\u20139). Countering PUF Modeling Attacks through Adversarial Machine Learning. Proceedings of the 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Tampa, FL, USA.","DOI":"10.1109\/ISVLSI51109.2021.00071"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1109\/TCAD.2020.3036807","article-title":"A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication","volume":"40","author":"Gu","year":"2021","journal-title":"IEEE Trans.-Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_109","unstructured":"Mahmoud, A., R\u00fchrmair, U., Majzoobi, M., and Koushanfar, F. (2022, September 26). Combined Modeling and Side Channel Attacks on Strong PUFs. Cryptology ePrint Archive Paper 2013\/632. Available online: https:\/\/eprint.iacr.org\/2013\/632."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TVLSI.2017.2759731","article-title":"A Combined Optimization-Theoretic and Side- Channel Approach for Attacking Strong Physical Unclonable Functions","volume":"26","author":"Liu","year":"2018","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Arjona, R., and Baturone, I. (2016, January 23\u201326). A dual-factor access control system based on device and user intrinsic identifiers. Proceedings of the IECON 2016\u201442nd Annual Conference of the IEEE Industrial Electronics Society, Florence, Italy.","DOI":"10.1109\/IECON.2016.7793033"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Prada-Delgado, M.A., V\u00e1zquez-Reyes, A., and Baturone, I. (2016, January 23\u201326). Physical unclonable keys for smart lock systems using Bluetooth Low Energy. Proceedings of the IECON 2016\u201442nd Annual Conference of the IEEE Industrial Electronics Society, Florence, Italy.","DOI":"10.1109\/IECON.2016.7792955"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/JSSC.2021.3125255","article-title":"In-Memory Unified TRNG and Multi-Bit PUF for Ubiquitous Hardware Security","volume":"57","author":"Taneja","year":"2022","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Ding, Q., Jiang, H., Li, J., Liu, C., Jie, Y., Chen, P., Zhao, Y., Ding, Y., Gong, T., and Yang, J. (2021, January 11\u201316). Unified 0.75 pJ\/Bit TRNG and Attack Resilient 2F 2\/Bit PUF for Robust Hardware Security Solutions with 4-layer Stacking 3D NbOx Threshold Switching Array. Proceedings of the 2021 IEEE International Electron Devices Meeting (IEDM), San Francisco, CA, USA.","DOI":"10.1109\/IEDM19574.2021.9720641"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Sala, R.D., and Scotti, G. (2022, January 12\u201315). The DD-Cell: A Double Side Entropic Source exploitable as PUF and TRNG. Proceedings of the 2022 17th Conference on Ph.D Research in Microelectronics and Electronics (PRIME), Villasimius, Italy.","DOI":"10.1109\/PRIME55000.2022.9816824"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Rahman, M.T., Forte, D., Wang, X., and Tehranipoor, M. (2016, January 19\u201320). Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs. Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), Yilan, Taiwan.","DOI":"10.1109\/AsianHOST.2016.7835559"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Fischer, V. (2012). A Closer Look at Security in Random Number Generators Design. Constructive Side-Channel Analysis and Secure Design, Springer.","DOI":"10.1007\/978-3-642-29912-4_13"},{"key":"ref_118","unstructured":"Aura, T. (1997, January 10\u201312). Strategies against replay attacks. Proceedings of the Proceedings 10th Computer Security Foundations Workshop, Rockport, MA, USA."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Xu, M., Huber, M., Sun, Z., England, P., Peinado, M., Lee, S., Marochko, A., Mattoon, D., Spiger, R., and Thom, S. (2019, January 19\u201323). Dominance as a New Trusted Computing Primitive for the Internet of Things. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00084"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.3233\/JIFS-169147","article-title":"Analysis of the use of Rainbow Tables to break hash","volume":"32","author":"Horalek","year":"2017","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_121","first-page":"1018","article-title":"Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system","volume":"23","author":"Ali","year":"2021","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Dworkin, M. (2001). Recommendation for Block Cipher Modes of Operation: Methods and Techniques, National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Vaidehi, M., and Rabi, B.J. (2014, January 8). Design and analysis of AES-CBC mode for high security applications. Proceedings of the Second International Conference on Current Trends In Engineering and Technology\u2014ICCTET 2014, Coimbatore, India.","DOI":"10.1109\/ICCTET.2014.6966347"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"AlZain, M.A. (2022). Efficient Segment-based Image Ciphering using Discretized Chaotic Standard Map with ECB, OFB and CBC. Int. J. Adv. Comput. Sci. Appl., 13.","DOI":"10.14569\/IJACSA.2022.0130550"},{"key":"ref_125","first-page":"1447","article-title":"Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation","volume":"68","author":"Kowsalya","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (2018). Handbook of Applied Cryptography, CRC Press.","DOI":"10.1201\/9781439821916"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/TIFS.2020.3021917","article-title":"3PAA: A Private PUF Protocol for Anonymous Authentication","volume":"16","author":"Chaterjee","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"137384","DOI":"10.1109\/ACCESS.2021.3117444","article-title":"T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT","volume":"9","author":"Lounis","year":"2021","journal-title":"IEEE Access"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Puntin, D., Stanzione, S., and Iannaccone, G. (2008, January 15\u201319). CMOS unclonable system for secure authentication based on device variability. Proceedings of the ESSCIRC 2008\u201434th European Solid-State Circuits Conference, Edinburgh, UK.","DOI":"10.1109\/ESSCIRC.2008.4681809"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Bhargava, M., and Mai, K. (2014, January 24\u201328). An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS. Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.7873\/DATE.2014.083"},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Che, W., Martin, M., Pocklassery, G., Kajuluri, V., Saqib, F., and Plusquellic, J. (2016). A Privacy-Preserving, Mutual PUF-Based Authentication Protocol. Cryptography, 1.","DOI":"10.3390\/cryptography1010003"},{"key":"ref_132","unstructured":"Hiller, M. (2016). Key Derivation with Physical Unclonable Functions. [Ph.D. Thesis, Technische Universit\u00e4t M\u00fcnchen]."},{"key":"ref_133","unstructured":"Suh, G., O\u2019Donnell, C., Sachdev, I., and Devadas, S. (2005, January 4\u20138). Design and implementation of the AEGIS single-chip secure processor using physical random functions. Proceedings of the 32nd International Symposium on Computer Architecture (ISCA\u201905), Madison, WI, USA."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","article-title":"PUF Modeling Attacks on Simulated and Silicon Data","volume":"8","author":"Sehnke","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Becker, G.T. (2015). The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TMSCS.2016.2553027","article-title":"A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication","volume":"2","author":"Yu","year":"2016","journal-title":"IEEE Trans.-Multi-Scale Comput. Syst."},{"key":"ref_137","unstructured":"Delvaux, J. (2017). Security Analysis of PUF-Based Key Generation and Entity Authentication. [Ph.D. Thesis, Shanghai Jiao Tong University]."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Satamraju, K.P., and Malarkodi, B. (2020, January 14\u201316). A PUF-based Mutual Authentication Protocol for Internet of Things. Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), Patna, India.","DOI":"10.1109\/ICCCS49678.2020.9276868"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"100057","DOI":"10.1016\/j.iot.2019.100057","article-title":"PUF-derived IoT identities in a zero-knowledge protocol for blockchain","volume":"9","author":"Baturone","year":"2020","journal-title":"Internet Things"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT security: Review, blockchain solutions, and open challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/11\/1566\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:06:11Z","timestamp":1760144771000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/11\/1566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":140,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["e24111566"],"URL":"https:\/\/doi.org\/10.3390\/e24111566","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,30]]}}}