I. Introduction
Over the last decade, physical unclonable functions (PUF) became a topic of increasing interest in cryptographic and authentication applications. Utilizing physical variations in the silicon resulting from limited fabrication accuracy, PUFs offer great characteristics for this field namely uniqueness, unpredictability and unclonability [1], [2]. When stimulated with a digital input, they generate an individual digital response based on their unique mismatches. So called “weak PUFs” [3] are capable of generating only few or even a single response. Their outputs usually cannot be used directly in an authentication scheme based on challenge-response-pairs (CRP) as the secrecy of the information is revealed in that process. Still weak PUFs can be used for either identification purposes (fingerprinting) or as sources of randomness for key generation in cryptographic hardware.