1. Contemporary Cryptology: The Science of Information Integrity, ed. G. J. Simmons (IEEE Press, 1994).
2. R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Science 297, 2026 (2002).
3. B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, Proceedings of the Computer and Communications Security Conference, 148 (2002)
4. D. E. Holcomb, W. P. Burleson, and K. Fu, Proceedings of the Conference on RFID Security, 7 (2007).
5. S. Kumar, J. Guajardo, R. Maes, G. J. Schrijen, and P. Tuyls, IEEE International Workshop on Hardware Oriented Security and Trust, 67 (2008).