I. Introduction
As the Integrated Circuit industry grows, counterfeiting ICs has also been growing as an illegal means of profit taking. In response to this trend, authenticating untrusted ICs has become a critical and pressing issue. Many methods are already available to identify and authenticate ICs [1]. Among them, solutions based on physical unclonable functions (PUF) show a high level of security due to their unpredictable response [2]. However, the high bit error rate in the response of PUFs requires strong error correcting codes to guarantee a low false negative rate [3]. As a result, it causes a tradeoff between the number of false negatives and the overhead of strong ECC.