1. [1] A. Mostafa, et al.: “Physical unclonable function and hashing are all you need to mutually authenticate IoT devices,” Sensors 20 (2020) 4361 (DOI: 10.3390/s20164361).
2. [2] P. Gope, et al.: “Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks,” IEEE Trans. Ind. Informat. 15 (2019) 4957 (DOI: 10.1109/TII.2019.2895030).
3. [3] J. Guajardo, et al.: “FPGA intrinsic PUFs and their use for IP protection,” CHES 2007 4727 (2007) 63 (DOI: 10.1007/978-3-540-74735-2_5).
4. [4] X.T. Ngo, et al.: “Cryptographically secure shield for security IPs protection,” IEEE Trans. Comput. 66 (2017) 354 (DOI: 10.1109/TC.2016.2584041).
5. [5] S.K. Cherupally, et al.: “A smart hardware security engine combining entropy sources of ECG, HRV, and SRAM PUF for authentication and secret key generation,” IEEE J. Solid-State Circuits 55 (2020) 2680 (DOI: 10.1109/JSSC.2020.3010705).