I. Introduction
Classical cryptographic primitives rely heavily on the ability to store secret information securely. For example, storing digital keys requires on-chip, non-volatile memory (NVM) such as fuse or EEPROM [1], [2]. However, fabricating on-chip NVM is expensive and difficult. Furthermore, on-chip memory is susceptible to physical attacks such as invasive, semi-invasive, or side-channel attacks, as well as to software attacks [3]. A class of novel cryptographic primitives called Physical Unclonable Functions (PUFs) has emerged as a promising technology to overcome these issues. PUF technology provides high security for identification and authentication by exploiting inherent manufacturing process variations. The complex statistical variations of transistors and interconnects in a PUF map a set of challenges to a set of responses, also known as Challenge Response Pairs (CRPs). The mapping of CRPs is unique to each PUF instance, thus, providing uniqueness, unclonability and randomness and making PUFs very suitable candidates for robust security devices.