<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">mireabulletin</journal-id><journal-title-group><journal-title xml:lang="ru">Russian Technological Journal</journal-title><trans-title-group xml:lang="en"><trans-title>Russian Technological Journal</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2782-3210</issn><issn pub-type="epub">2500-316X</issn><publisher><publisher-name>RTU MIREA</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.32362/2500-316X-2026-14-2-80-102</article-id><article-id custom-type="edn" pub-id-type="custom">LLZOKJ</article-id><article-id custom-type="elpub" pub-id-type="custom">mireabulletin-1467</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>МИКРО- И НАНОЭЛЕКТРОНИКА. ФИЗИКА КОНДЕНСИРОВАННОГО СОСТОЯНИЯ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>MICRO- AND NANOELECTRONICS. CONDENSED MATTER PHYSICS</subject></subj-group></article-categories><title-group><article-title>Физически неклонируемые функции в цифровых интегральных схемах</article-title><trans-title-group xml:lang="en"><trans-title>Physically unclonable functions in digital integrated circuits</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6264-1231</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Певцов</surname><given-names>Е. Ф.</given-names></name><name name-style="western" xml:lang="en"><surname>Pevtsov</surname><given-names>E. Ph.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Певцов Евгений Филиппович, к.т.н., директор структурного подразделения «Центр проектирования интегральных схем, устройств наноэлектроники и микросистем»</p><p>119454, Россия, Москва, пр-т Вернадского, д. 78</p></bio><bio xml:lang="en"><p>Evgenii Ph. Pevtsov, Cand. Sci. (Eng.), Director of Center for the Design of Integrated Circuits, Nanoelectronics Devices and Microsystems</p></bio><email xlink:type="simple">pevtsov@mirea.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-3519-6683</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Деменкова</surname><given-names>Т. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Demenkova</surname><given-names>T. A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Деменкова Татьяна Александровна, к.т.н., доцент, кафедра вычислительной техники, Институт информационных технологий</p><p>119454, Россия, Москва, пр-т Вернадского, д. 78</p></bio><bio xml:lang="en"><p>Tatyana A. Demenkova, Cand. Sci. (Eng.), Associated Professor, Computer Technology Department, Institute of Information Technologies,</p></bio><email xlink:type="simple">demenkova@mirea.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0000-3976-7872</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коротаев</surname><given-names>Ю. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Korotaev</surname><given-names>Yu. A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Коротаев Юрий Александрович, аспирант, кафедра наноэлектроники, Институт перспективных технологий и индустриального программирования</p><p>119454, Россия, Москва, пр-т Вернадского, д. 78</p></bio><bio xml:lang="en"><p>Yuri A. Korotaev, Postgraduate Student, Department of Nanoelectronics, Institute for Advanced Technologies and Industrial Programming</p></bio><email xlink:type="simple">korotaevya@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Сигов</surname><given-names>А. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Sigov</surname><given-names>A. S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Сигов Александр Сергеевич, академик Российской академии наук, д.ф.-м.н., профессор, президент</p><p>119454, Россия, Москва, пр-т Вернадского, д. 78</p></bio><bio xml:lang="en"><p>Alexander S. Sigov, Academician at the Russian Academy of Sciences, Dr. Sci. (Phys.–Math.), Professor, President</p></bio><email xlink:type="simple">sigov@mirea.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">MIREA – Russian Technological University<country>Россия</country></aff><aff xml:lang="en">MIREA – Russian Technological University<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>09</day><month>04</month><year>2026</year></pub-date><volume>14</volume><issue>2</issue><fpage>80</fpage><lpage>102</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Певцов Е.Ф., Деменкова Т.А., Коротаев Ю.А., Сигов А.С., 2026</copyright-statement><copyright-year>2026</copyright-year><copyright-holder xml:lang="ru">Певцов Е.Ф., Деменкова Т.А., Коротаев Ю.А., Сигов А.С.</copyright-holder><copyright-holder xml:lang="en">Pevtsov E.P., Demenkova T.A., Korotaev Y.A., Sigov A.S.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://www.rtj-mirea.ru/jour/article/view/1467">https://www.rtj-mirea.ru/jour/article/view/1467</self-uri><abstract><sec><title>Цели</title><p>Цели. Преимуществом модулей, реализующих физически неклонируемые функции (ФНФ) и встроенных в цифровой чип, является то, что отклики на запросы могут быть напрямую использованы другими приложениями устройства. Устройство способно запрашивать и считывать ФНФ без привлечения внешних инструментов и вывода запроса и ответа за пределы чипа. ФНФ может быть реализована с использованием технологических операций и компонентов, применяемых при изготовлении самого устройства. Статья является первой из двух обзорных публикаций, посвященных ФНФ как компонентам инфраструктуры аппаратной безопасности. Данная статья фокусируется на формальном описании ФНФ и их конструкциях, основанных на модулях памяти и анализе временных характеристик сигналов.</p></sec><sec><title>Методы</title><p>Методы. Использованы методы определения количественных показателей и признаков для формального описания ФНФ: вычислимость, уникальность, возможность реализации, сложность клонирования, защита от несанкционированного доступа.</p></sec><sec><title>Результаты</title><p>Результаты. Рассмотрены реализации ФНФ как физических устройств, обладающих уникальной сигнатурой. Предложена их классификация: ФНФ на основе временных характеристик сигналов, ФНФ на основе схем памяти и аналоговые ФНФ. Приведены наиболее типичные примеры реализаций первых двух типов. Показано, что решения на основе задержек сигналов обеспечивают широкое пространство пар «запрос – ответ», но требуют симметрии и/или калибровки, тогда как ФНФ на базе памяти проще реализуются в интегральных схемах и при корректной постобработке достигают высокой воспроизводимости, что делает их практичным выбором для многих приложений. Описаны подходы к компенсации влияния вариаций напряжения и температуры. Приведены примеры «сильных» память-ориентированных ФНФ и схемотехнические приемы повышения их стойкости к атакам.</p></sec><sec><title>Выводы</title><p>Выводы. Технология обеспечения безопасности на основе ФНФ обладает значительным потенциалом, особенно для применения в устройствах интернета вещей. Проведенный анализ показывает, что в сочетании с методами постобработки и компенсации эксплуатационных факторов ФНФ является зрелым инструментом обеспечения аппаратной безопасности.</p></sec></abstract><trans-abstract xml:lang="en"><sec><title>Objectives</title><p>Objectives. Modules that implement physically unclonable functions (PUFs) within a digital chip facilitate the direct use of challenge–response pairs by device applications that can query and read the PUF without external tools or exposing data outside the chip. A PUF can be implemented using technological processes and components already applied in device fabrication. The first of two reviews on PUFs as elements of hardware security infrastructure, the present paper focuses on the formal description of PUFs and designs based on memory modules and timing analysis.</p></sec><sec><title>Methods</title><p>Methods. The following quantitative indicators were applied to formally describe PUFs: computability, uniqueness, feasibility, cloning resistance, and protection against unauthorized access.</p></sec><sec><title>Results</title><p>Results. PUFs are considered as physical devices with unique signatures. A classification into three PUF groups is proposed: delay-based, memory-based, and analog. Typical examples of the first two groups are outlined. While delay-based solutions provide a large challenge–response space, they require symmetry and/or calibration. In contrast, memory-based PUFs are easier to implement in integrated circuits. With suitable post-processing, they can achieve high reproducibility, making them practical for many applications. Approaches to mitigating voltage and temperature variations are described along with examples of strong memory-oriented PUFs and circuit techniques that enhance resistance to attacks.</p></sec><sec><title>Conclusions</title><p>Conclusions. PUF-based security technologies demonstrate significant potential, particularly for the Internet of Things. When combined with post-processing and compensation methods, PUFs constitute a mature and effective tool for hardware security.</p></sec></trans-abstract><kwd-group xml:lang="ru"><kwd>физически неклонируемая функция</kwd><kwd>ФНФ</kwd><kwd>интегральные схемы</kwd><kwd>аппаратная безопасность</kwd><kwd>ФНФ типа «арбитр»</kwd><kwd>ФНФ на основе памяти</kwd><kwd>SRAM</kwd><kwd>DRAM</kwd><kwd>интернет вещей</kwd></kwd-group><kwd-group xml:lang="en"><kwd>physically unclonable function</kwd><kwd>PUF</kwd><kwd>integrated circuits</kwd><kwd>hardware security</kwd><kwd>arbiter PUF</kwd><kwd>memory-based PUF</kwd><kwd>SRAM</kwd><kwd>DRAM</kwd><kwd>Internet of Things</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Работа выполнена при поддержке Министерства науки и высшего образования РФ (Государственное задание для университетов № FSFZ-2026-0003) и с применением оборудования Центра коллективного пользования РТУ МИРЭА (соглашение от 01.09.2021 № 075-15-2021-689, уникальный идентификационный номер 2296.61321X0010).</funding-statement></funding-group><funding-group xml:lang="en"><funding-statement>This work was supported by the Ministry of Science and Higher Education of the Russian Federation (State task for universities No. FSFZ-2026-0003) and using the equipment of the Center for Collective Use of RTU MIREA (agreement dated September 01, 2021, No. 075-15-2021-689, unique identification number 2296.61321X0010).</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Khalil K., Idris H., Idriss T., Bayoumi M. Lightweight Hardware Security and Physically Unclonable Functions: Improving Security of Constrained IoT Devices. Cham: Springer Nature Switzerland; 2025, 152 р.</mixed-citation><mixed-citation xml:lang="en">Khalil K., Idris H., Idriss T., Bayoumi M. Lightweight Hardware Security and Physically Unclonable Functions: Improving Security of Constrained IoT Devices. Cham: Springer Nature Switzerland; 2025, 152 р.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">McGrath T., Bagci I.E., Wang Z.M., Roedig U., Young R.J. A PUF taxonomy. Appl. Phys. Rev. 2019;6(1):011303. https://doi.org/10.1063/1.5079407</mixed-citation><mixed-citation xml:lang="en">McGrath T., Bagci I.E., Wang Z.M., Roedig U., Young R.J. A PUF taxonomy. Appl. Phys. Rev. 2019;6(1):011303. https://doi.org/10.1063/1.5079407</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Zerrouki F., Ouchani S., Bouarfa H. A survey on silicon PUFs. J. Syst. Archit. 2022;127:102514. https://doi.org/10.1016/j.sysarc.2022.102514</mixed-citation><mixed-citation xml:lang="en">Zerrouki F., Ouchani S., Bouarfa H. A survey on silicon PUFs. J. Syst. Archit. 2022;127:102514. https://doi.org/10.1016/j.sysarc.2022.102514</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Alhamarneh R.A., Mahinderjit Singh M. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications. Appl. Sci. 2024;14(5):1700. https://doi.org/10.3390/app14051700</mixed-citation><mixed-citation xml:lang="en">Alhamarneh R.A., Mahinderjit Singh M. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications. Appl. Sci. 2024;14(5):1700. https://doi.org/10.3390/app14051700</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Tehranipoor M., Pundir N., Vashistha N., Farahmandi F. Hardware Security Primitives. Cham: Springer; 2023, 350 р.</mixed-citation><mixed-citation xml:lang="en">Tehranipoor M., Pundir N., Vashistha N., Farahmandi F. Hardware Security Primitives. Cham: Springer; 2023, 350 р.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Maes R., Verbauwhede I. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. In: Sadeghi A.-R., Naccache D. (Eds.). Towards Hardware-Intrinsic Security: Foundations and Practice. Berlin: Springer; 2010. P. 3–37. https://doi.org/10.1007/978-3-642-14452-3_1</mixed-citation><mixed-citation xml:lang="en">Maes R., Verbauwhede I. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. In: Sadeghi A.-R., Naccache D. (Eds.). Towards Hardware-Intrinsic Security: Foundations and Practice. Berlin: Springer; 2010. P. 3–37. https://doi.org/10.1007/978-3-642-14452-3_1</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Suh G.E., Devadas S. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: Proceedings of the 44th ACM/IEEE Design Automation Conference (DAC 2007), San Diego, CA, USA, June 4–8, 2007. New York: ACM; 2007. P. 9–14. https://doi.org/10.1145/1278480.1278484</mixed-citation><mixed-citation xml:lang="en">Suh G.E., Devadas S. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: Proceedings of the 44th ACM/IEEE Design Automation Conference (DAC 2007), San Diego, CA, USA, June 4–8, 2007. New York: ACM; 2007. P. 9–14. https://doi.org/10.1145/1278480.1278484</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Лебедев В.Р., Певцов Е.Ф., Деменкова Т.А., Малето М.И., Филимонов В.В. Метод исследования реализации физически неклонируемых функций в информационных системах. International Journal of Open Information Technologies. 2024;12(1):28–36. URL: http://injoit.org/index.php/j1/article/view/1712. Дата обращения 10.07.2025. / Accessed July 10, 2025.</mixed-citation><mixed-citation xml:lang="en">Lebedev V.R., Pevtsov E.F., Demenkova T.A., Maleto M.I., Filimonov V.V. Method for studying the implementation of Physical Unclonable Function in information systems. Int. J. Open Inf. Technol. 2024;12(1):28–36 (in Russ.). Available from URL: http://injoit.org/index.php/j1/article/view/1712. Accessed July 10, 2025.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Gassend B., Clarke D., van Dijk M., Devadas S. Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA, November 18–22, 2002. New York: ACM; 2002. P. 148–160. https://doi.org/10.1145/586110.586132</mixed-citation><mixed-citation xml:lang="en">Gassend B., Clarke D., van Dijk M., Devadas S. Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA, November 18–22, 2002. New York: ACM; 2002. P. 148–160. https://doi.org/10.1145/586110.586132</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Vivekraja V., Nazhandali L. Circuit-level techniques for reliable physically unclonable functions. In: Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), San Francisco, CA, USA, July 27, 2009. Piscataway, NJ: IEEE; 2009. P. 30–35. https://doi.org/10.1109/HST.2009.5225054</mixed-citation><mixed-citation xml:lang="en">Vivekraja V., Nazhandali L. Circuit-level techniques for reliable physically unclonable functions. In: Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), San Francisco, CA, USA, July 27, 2009. Piscataway, NJ: IEEE; 2009. P. 30–35. https://doi.org/10.1109/HST.2009.5225054</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Pappu R., Recht B., Taylor J., Gershenfeld N. Physical one-way functions. Science. 2002;297(5589):2026–2030. https://doi.org/10.1126/science.1074376</mixed-citation><mixed-citation xml:lang="en">Pappu R., Recht B., Taylor J., Gershenfeld N. Physical one-way functions. Science. 2002;297(5589):2026–2030. https://doi.org/10.1126/science.1074376</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Anandakumar N.N., Hashmi M.S., Tehranipoor M. FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures. Integration. 2021;81:175–194. https://doi.org/10.1016/j.vlsi.2021.06.001</mixed-citation><mixed-citation xml:lang="en">Anandakumar N.N., Hashmi M.S., Tehranipoor M. FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures. Integration. 2021;81:175–194. https://doi.org/10.1016/j.vlsi.2021.06.001</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Cao Y., Xu J., Wu J., Wu S., Huang Z., Zhang K. Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review. Mathematics (Basel). 2024;12(1):77. https://doi.org/10.3390/math12010077</mixed-citation><mixed-citation xml:lang="en">Cao Y., Xu J., Wu J., Wu S., Huang Z., Zhang K. Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review. Mathematics (Basel). 2024;12(1):77. https://doi.org/10.3390/math12010077</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Vatalaro M., De Rose R., Lanuzza M., Crupi F. Weak physically unclonable functions in CMOS technology: A review. Chips. 2025;4(1):3. https://doi.org/10.3390/chips4010003</mixed-citation><mixed-citation xml:lang="en">Vatalaro M., De Rose R., Lanuzza M., Crupi F. Weak physically unclonable functions in CMOS technology: A review. Chips. 2025;4(1):3. https://doi.org/10.3390/chips4010003</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Sklavos N., Chaves R., Di Natale G., Regazzoni F. Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment. Cham: Springer; 2017, 254 р. https://doi.org/10.1007/978-3-319-44318-8</mixed-citation><mixed-citation xml:lang="en">Sklavos N., Chaves R., Di Natale G., Regazzoni F. Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment. Cham: Springer; 2017, 254 р. https://doi.org/10.1007/978-3-319-44318-8</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Lata K., Cenkeramaddi L.R. FPGA-Based PUF Designs: A comprehensive review and comparative analysis. Cryptography. 2023;7(4):55. https://doi.org/10.3390/cryptography7040055</mixed-citation><mixed-citation xml:lang="en">Lata K., Cenkeramaddi L.R. FPGA-Based PUF Designs: A comprehensive review and comparative analysis. Cryptography. 2023;7(4):55. https://doi.org/10.3390/cryptography7040055</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Masoumian S., Selimis G., Wang R., Schrijen G-J., Hamdioui S., Taouil M. Reliability analysis of FinFET-based SRAM PUFs for 16 nm, 14 nm and 7 nm technology nodes. In: Proceedings of the 2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2022), Antwerp, Belgium, March 14–23, 2022. Piscataway, NJ: IEEE; 2022. Р. 1189–1192. https://doi.org/10.23919/DATE54114.2022.9774735</mixed-citation><mixed-citation xml:lang="en">Masoumian S., Selimis G., Wang R., Schrijen G-J., Hamdioui S., Taouil M. Reliability analysis of FinFET-based SRAM PUFs for 16 nm, 14 nm and 7 nm technology nodes. In: Proceedings of the 2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2022), Antwerp, Belgium, March 14–23, 2022. Piscataway, NJ: IEEE; 2022. Р. 1189–1192. https://doi.org/10.23919/DATE54114.2022.9774735</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Eiroa S., Baturone I., Acosta A.J., Dávila J. Using physical unclonable functions for hardware authentication: A survey. In: Proceedings of the 25th Conference on Design of Circuits and Integrated Systems (DCIS 2010), Lanzarote, Canary Islands, Spain, November 17–19, 2010. Lanzarote; 2010. URL: https://digital.csic.es/bitstream/10261/96029/1/Using%20Physical.pdf</mixed-citation><mixed-citation xml:lang="en">Eiroa S., Baturone I., Acosta A.J., Dávila J. Using physical unclonable functions for hardware authentication: A survey. In: Proceedings of the 25th Conference on Design of Circuits and Integrated Systems (DCIS 2010), Lanzarote, Canary Islands, Spain, November 17–19, 2010. Lanzarote; 2010. URL: https://digital.csic.es/bitstream/10261/96029/1/Using%20Physical.pdf</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Bossuet L., Ngo X.T., Cherif Z., Fischer V. A PUF based on a transient effect ring oscillator and insensitive to locking phenomenon. IEEE Trans. Emerg. Top. Comput. 2014;2(1):30–36. https://doi.org/10.1109/TETC.2013.2287182</mixed-citation><mixed-citation xml:lang="en">Bossuet L., Ngo X.T., Cherif Z., Fischer V. A PUF based on a transient effect ring oscillator and insensitive to locking phenomenon. IEEE Trans. Emerg. Top. Comput. 2014;2(1):30–36. https://doi.org/10.1109/TETC.2013.2287182</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Brzuska C., Fischlin M., Schröder H., Katzenbeisser S. Physically uncloneable functions in the universal composition framework. In: Rogaway P. (Ed.). Advances in Cryptology – CRYPTO 2011, Santa Barbara, CA, USA, August 14–18, 2011. Book Series: Lecture Notes in Computer Science. Berlin: Springer; 2011. V. 6841. P. 51–70. https://doi.org/10.1007/978-3-642-22792-9_4</mixed-citation><mixed-citation xml:lang="en">Brzuska C., Fischlin M., Schröder H., Katzenbeisser S. Physically uncloneable functions in the universal composition framework. In: Rogaway P. (Ed.). Advances in Cryptology – CRYPTO 2011, Santa Barbara, CA, USA, August 14–18, 2011. Book Series: Lecture Notes in Computer Science. Berlin: Springer; 2011. V. 6841. P. 51–70. https://doi.org/10.1007/978-3-642-22792-9_4</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Tuyls P., Schrijen G-J., Škorić B., van Geloven J., Verhaegh N., Wolters R. Read-proof hardware from protective coatings. In: Goubin L., Matsui M. (Eds.). Cryptographic Hardware and Embedded Systems. CHES 2006, Yokohama, Japan, October 10–13, 2006. Book Series: Lecture Notes in Computer Science. Berlin: Springer; 2006. V. 4249. Р. 369–383. https://doi.org/10.1007/11894063_29</mixed-citation><mixed-citation xml:lang="en">Tuyls P., Schrijen G-J., Škorić B., van Geloven J., Verhaegh N., Wolters R. Read-proof hardware from protective coatings. In: Goubin L., Matsui M. (Eds.). Cryptographic Hardware and Embedded Systems. CHES 2006, Yokohama, Japan, October 10–13, 2006. Book Series: Lecture Notes in Computer Science. Berlin: Springer; 2006. V. 4249. Р. 369–383. https://doi.org/10.1007/11894063_29</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Chen Q., Csaba G., Lugli P., Schlichtmann U., Rührmair U. The bistable ring PUF: a new architecture for strong physical unclonable functions. In: Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2011), San Diego, CA, USA, June 5–6, 2011. Piscataway, NJ: IEEE; 2011. Р. 134–141. https://doi.org/10.1109/HST.2011.5955011</mixed-citation><mixed-citation xml:lang="en">Chen Q., Csaba G., Lugli P., Schlichtmann U., Rührmair U. The bistable ring PUF: a new architecture for strong physical unclonable functions. In: Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2011), San Diego, CA, USA, June 5–6, 2011. Piscataway, NJ: IEEE; 2011. Р. 134–141. https://doi.org/10.1109/HST.2011.5955011</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Abulibdeh E., Saleh H., Mohammad B., Al-Qutayri M., Veeran A. Area and power efficient implementation of configurable ring oscillator PUF. TechRxiv Preprint; April 2, 2024. https://doi.org/10.36227/techrxiv.171207533.30573247/v1</mixed-citation><mixed-citation xml:lang="en">Abulibdeh E., Saleh H., Mohammad B., Al-Qutayri M., Veeran A. Area and power efficient implementation of configurable ring oscillator PUF. TechRxiv Preprint; April 2, 2024. https://doi.org/10.36227/techrxiv.171207533.30573247/v1</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Abulibdeh E., Saleh H., Mohammad B., Al-Qutayri M., Hussain A. Kernel-based response extraction approach for efficient configurable ring oscillator PUF. Sci. Rep. 2025;15:5938. https://doi.org/10.1038/s41598-025-89769-5</mixed-citation><mixed-citation xml:lang="en">Abulibdeh E., Saleh H., Mohammad B., Al-Qutayri M., Hussain A. Kernel-based response extraction approach for efficient configurable ring oscillator PUF. Sci. Rep. 2025;15:5938. https://doi.org/10.1038/s41598-025-89769-5</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Иванюк А.А., Ярмолик В.Н. Конфигурируемый кольцевой осциллятор с управляемыми межсоединениями. Безопасность информационных технологий. 2024;31(2):121–133. https://doi.org/10.26583/bit.2024.2.08</mixed-citation><mixed-citation xml:lang="en">Ivaniuk A.A., Yarmolik V.N. Configurable ring oscillator with controlled interconnections. Bezopasnost’ informatsionnykh tekhnologii = IT Security (Russia). 2024;31(2):121–133 (in Russ.). https://doi.org/10.26583/bit.2024.2.08</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Du H., Guo C., Cui S. Optimization design of the RO PUF temperature reliability based on MOSFET temperature characteristics. In: The International Conference Optoelectronic Information and Optical Engineering (OIOE 2024), Wuhan, China, October 18–20, 2024. Proc. SPIE 13513; 2025. Art. 1351324. https://doi.org/10.1117/12.3045630</mixed-citation><mixed-citation xml:lang="en">Du H., Guo C., Cui S. Optimization design of the RO PUF temperature reliability based on MOSFET temperature characteristics. In: The International Conference Optoelectronic Information and Optical Engineering (OIOE 2024), Wuhan, China, October 18–20, 2024. Proc. SPIE 13513; 2025. Art. 1351324. https://doi.org/10.1117/12.3045630</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Schaller A., Xiong W., Anagnostopoulos N.A., Saleem M.U., Gabmeyer S., Katzenbeisser S., Szefer J. Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. In: Proceedings of the 2017 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2017), McLean, VA, USA, May 1–5, 2017. Piscataway, NJ: IEEE; 2017. Р. 1–7. https://doi.org/10.1109/HST.2017.7951729</mixed-citation><mixed-citation xml:lang="en">Schaller A., Xiong W., Anagnostopoulos N.A., Saleem M.U., Gabmeyer S., Katzenbeisser S., Szefer J. Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. In: Proceedings of the 2017 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2017), McLean, VA, USA, May 1–5, 2017. Piscataway, NJ: IEEE; 2017. Р. 1–7. https://doi.org/10.1109/HST.2017.7951729</mixed-citation></citation-alternatives></ref><ref id="cit28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">Anandakumar N.N., Hashmi M.S., Chaudhary M.A. Implementation of efficient XOR arbiter PUF on FPGA with enhanced uniqueness and security. IEEE Access. 2022;10:129832–129842. https://doi.org/10.1109/ACCESS.2022.3228635</mixed-citation><mixed-citation xml:lang="en">Anandakumar N.N., Hashmi M.S., Chaudhary M.A. Implementation of efficient XOR arbiter PUF on FPGA with enhanced uniqueness and security. IEEE Access. 2022;10:129832–129842. https://doi.org/10.1109/ACCESS.2022.3228635</mixed-citation></citation-alternatives></ref><ref id="cit29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Hori Y., Kang H., Katashita T., Satoh A. Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function. In: Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig’11), Cancun, Mexico, November 30 – December 2, 2011. Cancun: IEEE; 2011. Р. 223–228. https://doi.org/10.1109/ReConFig.2011.72</mixed-citation><mixed-citation xml:lang="en">Hori Y., Kang H., Katashita T., Satoh A. Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function. In: Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig’11), Cancun, Mexico, November 30 – December 2, 2011. Cancun: IEEE; 2011. Р. 223–228. https://doi.org/10.1109/ReConFig.2011.72</mixed-citation></citation-alternatives></ref><ref id="cit30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">Marchand C., Bossuet L., Cherkaoui A. Enhanced TERO-PUF implementations and characterization on FPGAs. In: Proceedings of the 2016 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA 2016), Monterey, CA, USA, February 21–23, 2016. New York: ACM; 2016. Р. 282. https://doi.org/10.1145/2847263.2847298</mixed-citation><mixed-citation xml:lang="en">Marchand C., Bossuet L., Cherkaoui A. Enhanced TERO-PUF implementations and characterization on FPGAs. In: Proceedings of the 2016 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA 2016), Monterey, CA, USA, February 21–23, 2016. New York: ACM; 2016. Р. 282. https://doi.org/10.1145/2847263.2847298</mixed-citation></citation-alternatives></ref><ref id="cit31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Xu X., Rührmair U., Holcomb D.E., Burleson W.P. Security evaluation and enhancement of bistable ring PUFs. In: Mangard S., Schaumont P. (Eds.). Radio Frequency Identification. RFIDSec 2015. Book Series: Lecture Notes in Computer Science. Cham: Springer; 2015. V. 9440. Р. 3–16. https://doi.org/10.1007/978-3-319-24837-0_1</mixed-citation><mixed-citation xml:lang="en">Xu X., Rührmair U., Holcomb D.E., Burleson W.P. Security evaluation and enhancement of bistable ring PUFs. In: Mangard S., Schaumont P. (Eds.). Radio Frequency Identification. RFIDSec 2015. Book Series: Lecture Notes in Computer Science. Cham: Springer; 2015. V. 9440. Р. 3–16. https://doi.org/10.1007/978-3-319-24837-0_1</mixed-citation></citation-alternatives></ref><ref id="cit32"><label>32</label><citation-alternatives><mixed-citation xml:lang="ru">Thirumoorthi M., Jovanovic M., Mirhassani M., Khalid M.A.S. Design and evaluation of a hybrid chaotic-bistable ring PUF. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2021;29(11):1912–1921. https://doi.org/10.1109/TVLSI.2021.3111588</mixed-citation><mixed-citation xml:lang="en">Thirumoorthi M., Jovanovic M., Mirhassani M., Khalid M.A.S. Design and evaluation of a hybrid chaotic-bistable ring PUF. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2021;29(11):1912–1921. https://doi.org/10.1109/TVLSI.2021.3111588</mixed-citation></citation-alternatives></ref><ref id="cit33"><label>33</label><citation-alternatives><mixed-citation xml:lang="ru">Sharifi F., Momeni H., Hosseini A. Ternary bistable ring PUF for high-secure applications. J. Supercomput. 2024;80: 12663–12685. https://doi.org/10.1007/s11227-024-05935-y</mixed-citation><mixed-citation xml:lang="en">Sharifi F., Momeni H., Hosseini A. Ternary bistable ring PUF for high-secure applications. J. Supercomput. 2024;80: 12663–12685. https://doi.org/10.1007/s11227-024-05935-y</mixed-citation></citation-alternatives></ref><ref id="cit34"><label>34</label><citation-alternatives><mixed-citation xml:lang="ru">Rührmair U., van Dijk M. On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. J. Cryptogr. Eng. 2013;3(1):17–28. https://doi.org/10.1007/s13389-013-0052-8</mixed-citation><mixed-citation xml:lang="en">Rührmair U., van Dijk M. On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. J. Cryptogr. Eng. 2013;3(1):17–28. https://doi.org/10.1007/s13389-013-0052-8</mixed-citation></citation-alternatives></ref><ref id="cit35"><label>35</label><citation-alternatives><mixed-citation xml:lang="ru">Rührmair U. Oblivious transfer based on physical unclonable functions. In: Acquisti A., Smith S.W., Sadeghi A.-R. (Eds.). Trust and Trustworthy Computing. TRUST 2010. Berlin: Springer; 2010. V. 6101. Р. 430–440. https://doi.org/10.1007/978-3-642-13869-0_31</mixed-citation><mixed-citation xml:lang="en">Rührmair U. Oblivious transfer based on physical unclonable functions. In: Acquisti A., Smith S.W., Sadeghi A.-R. (Eds.). Trust and Trustworthy Computing. TRUST 2010. Berlin: Springer; 2010. V. 6101. Р. 430–440. https://doi.org/10.1007/978-3-642-13869-0_31</mixed-citation></citation-alternatives></ref><ref id="cit36"><label>36</label><citation-alternatives><mixed-citation xml:lang="ru">Roy A., Roy D., Stănică P. On combining Arbiter based PUFs. Cryptogr. Commun. 2025;17(2):493–510. https://doi.org/10.1007/s12095-024-00769-0</mixed-citation><mixed-citation xml:lang="en">Roy A., Roy D., Stănică P. On combining Arbiter based PUFs. Cryptogr. Commun. 2025;17(2):493–510. https://doi.org/10.1007/s12095-024-00769-0</mixed-citation></citation-alternatives></ref><ref id="cit37"><label>37</label><citation-alternatives><mixed-citation xml:lang="ru">Driemeyer B., Mandry H., Wiens D.-P., Becker J., Kauffman J.G., Ortmanns M. An eye-opening Arbiter PUF for fingerprint generation using auto-error detection for PVT-robust masking and bit stabilization achieving a BER of 2e-8 in 28 nm CMOS. In: Proceedings of the 2025 IEEE International Solid-State Circuits Conference (ISSCC 2025), San Francisco, CA, USA, February 16–20, 2025. Piscataway, NJ: IEEE; 2025. Р. 300–302. https://doi.org/10.1109/ISSCC49661.2025.10904785</mixed-citation><mixed-citation xml:lang="en">Driemeyer B., Mandry H., Wiens D.-P., Becker J., Kauffman J.G., Ortmanns M. An eye-opening Arbiter PUF for fingerprint generation using auto-error detection for PVT-robust masking and bit stabilization achieving a BER of 2e-8 in 28 nm CMOS. In: Proceedings of the 2025 IEEE International Solid-State Circuits Conference (ISSCC 2025), San Francisco, CA, USA, February 16–20, 2025. Piscataway, NJ: IEEE; 2025. Р. 300–302. https://doi.org/10.1109/ISSCC49661.2025.10904785</mixed-citation></citation-alternatives></ref><ref id="cit38"><label>38</label><citation-alternatives><mixed-citation xml:lang="ru">Yao Y., Kim M., Li J., Markov I., Koushanfar F. ClockPUF: physical unclonable functions based on clock networks. In: Proceedings of the Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2013), Grenoble, France, March 18–22, 2013. Piscataway, NJ: IEEE; 2013. P. 422–427. https://doi.org/10.7873/DATE.2013.095</mixed-citation><mixed-citation xml:lang="en">Yao Y., Kim M., Li J., Markov I., Koushanfar F. ClockPUF: physical unclonable functions based on clock networks. In: Proceedings of the Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2013), Grenoble, France, March 18–22, 2013. Piscataway, NJ: IEEE; 2013. P. 422–427. https://doi.org/10.7873/DATE.2013.095</mixed-citation></citation-alternatives></ref><ref id="cit39"><label>39</label><citation-alternatives><mixed-citation xml:lang="ru">Khan S., Shah A.P., Chouhan S.S., Roy A., Roy D., Stănică P. Utilizing manufacturing variations to design a tri-state flip-flop PUF for IoT security applications. Analog Integr. Circ. Sig. Process. 2020;103:477–492. https://doi.org/10.1007/s10470-020-01642-9</mixed-citation><mixed-citation xml:lang="en">Khan S., Shah A.P., Chouhan S.S., Roy A., Roy D., Stănică P. Utilizing manufacturing variations to design a tri-state flip-flop PUF for IoT security applications. Analog Integr. Circ. Sig. Process. 2020;103:477–492. https://doi.org/10.1007/s10470-020-01642-9</mixed-citation></citation-alternatives></ref><ref id="cit40"><label>40</label><citation-alternatives><mixed-citation xml:lang="ru">Yuan T., Wang P., Zhang Y., Zhou Z. An overclocking clock software PUF circuit with no additional hardware resource overhead based on video coding circuit. Integration. 2025;101:102319. https://doi.org/10.1016/j.vlsi.2024.102319</mixed-citation><mixed-citation xml:lang="en">Yuan T., Wang P., Zhang Y., Zhou Z. An overclocking clock software PUF circuit with no additional hardware resource overhead based on video coding circuit. Integration. 2025;101:102319. https://doi.org/10.1016/j.vlsi.2024.102319</mixed-citation></citation-alternatives></ref><ref id="cit41"><label>41</label><citation-alternatives><mixed-citation xml:lang="ru">Suzuki D., Shimizu K. The Glitch PUF: a new Delay-PUF architecture exploiting glitch shapes. In: Mangard S., Standaert F.-X. (Eds.). Cryptographic Hardware and Embedded Systems. CHES 2010, August 17–20, 2010. Santa Barbara, CA, USA. Book Series: Lecture Notes in Computer Science. Berlin: Springer; 2010. V. 6225. Р. 366–382. https://doi.org/10.1007/978-3-642-15031-9_25</mixed-citation><mixed-citation xml:lang="en">Suzuki D., Shimizu K. The Glitch PUF: a new Delay-PUF architecture exploiting glitch shapes. In: Mangard S., Standaert F.-X. (Eds.). Cryptographic Hardware and Embedded Systems. CHES 2010, August 17–20, 2010. Santa Barbara, CA, USA. Book Series: Lecture Notes in Computer Science. Berlin: Springer; 2010. V. 6225. Р. 366–382. https://doi.org/10.1007/978-3-642-15031-9_25</mixed-citation></citation-alternatives></ref><ref id="cit42"><label>42</label><citation-alternatives><mixed-citation xml:lang="ru">Anderson J. A PUF design for secure FPGA-based embedded systems. In: Proceedings of the 15th Asia South Pacific Design Automation Conference (ASP-DAC 2010), Taipei, Taiwan, January 18–21, 2010. Piscataway, NJ: IEEE; 2010. Р. 1–6. https://doi.org/10.1109/ASPDAC.2010.5419927</mixed-citation><mixed-citation xml:lang="en">Anderson J. A PUF design for secure FPGA-based embedded systems. In: Proceedings of the 15th Asia South Pacific Design Automation Conference (ASP-DAC 2010), Taipei, Taiwan, January 18–21, 2010. Piscataway, NJ: IEEE; 2010. Р. 1–6. https://doi.org/10.1109/ASPDAC.2010.5419927</mixed-citation></citation-alternatives></ref><ref id="cit43"><label>43</label><citation-alternatives><mixed-citation xml:lang="ru">Ni L., Wang P., Zhang Y., Chen J., Li L., Zhang H. A reliable multi-information entropy glitch PUF using Schmitt trigger sampling method for IoT security. In: 2021 IEEE 14th International Conference on ASIC (ASICON 2021), Kunming, China, October 26–29, 2021. Piscataway, NJ: IEEE; 2021. Р. 1–4. https://doi.org/10.1109/ASICON52560.2021.9620406</mixed-citation><mixed-citation xml:lang="en">Ni L., Wang P., Zhang Y., Chen J., Li L., Zhang H. A reliable multi-information entropy glitch PUF using Schmitt trigger sampling method for IoT security. In: 2021 IEEE 14th International Conference on ASIC (ASICON 2021), Kunming, China, October 26–29, 2021. Piscataway, NJ: IEEE; 2021. Р. 1–4. https://doi.org/10.1109/ASICON52560.2021.9620406</mixed-citation></citation-alternatives></ref><ref id="cit44"><label>44</label><citation-alternatives><mixed-citation xml:lang="ru">Nozaki Y., Takemoto S., Yoshikawa M. Error correction method for lightweight cipher PRINCE-based physically unclonable function. In: Proceedings of the 6th International Conference on Information Technology and Computer Communications (ITCC 2024), Xi’an, China, July 5–7, 2024. New York: ACM; 2024. Р. 38–42. https://doi.org/10.1145/3704391.3704397</mixed-citation><mixed-citation xml:lang="en">Nozaki Y., Takemoto S., Yoshikawa M. Error correction method for lightweight cipher PRINCE-based physically unclonable function. In: Proceedings of the 6th International Conference on Information Technology and Computer Communications (ITCC 2024), Xi’an, China, July 5–7, 2024. New York: ACM; 2024. Р. 38–42. https://doi.org/10.1145/3704391.3704397</mixed-citation></citation-alternatives></ref><ref id="cit45"><label>45</label><citation-alternatives><mixed-citation xml:lang="ru">Guajardo J., Kumar S.S., Schrijen G-J., Tuyls P. FPGA intrinsic PUFs and their use for IP protection. In: Paillier P., Verbauwhede I. (Eds.). Cryptographic Hardware and Embedded Systems – CHES 2007, Vienna, Austria, September 10–13, 2007. Lecture Notes in Computer Science. Berlin: Springer; 2007. V. 4727. Р. 63–80. https://doi.org/10.1007/978-3-540-74735-2_5</mixed-citation><mixed-citation xml:lang="en">Guajardo J., Kumar S.S., Schrijen G-J., Tuyls P. FPGA intrinsic PUFs and their use for IP protection. In: Paillier P., Verbauwhede I. (Eds.). Cryptographic Hardware and Embedded Systems – CHES 2007, Vienna, Austria, September 10–13, 2007. Lecture Notes in Computer Science. Berlin: Springer; 2007. V. 4727. Р. 63–80. https://doi.org/10.1007/978-3-540-74735-2_5</mixed-citation></citation-alternatives></ref><ref id="cit46"><label>46</label><citation-alternatives><mixed-citation xml:lang="ru">Holcomb D.E., Burleson W.P., Fu K. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. Proceedings of the Conference on RFID Security. 2007;7(2):01–012.</mixed-citation><mixed-citation xml:lang="en">Holcomb D.E., Burleson W.P., Fu K. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. Proceedings of the Conference on RFID Security. 2007;7(2):01–012.</mixed-citation></citation-alternatives></ref><ref id="cit47"><label>47</label><citation-alternatives><mixed-citation xml:lang="ru">Gebali F., Mamun M. Review of physically unclonable functions (PUFs): Structures, models, and algorithms. Front. Sens. 2022;2:751748. https://doi.org/10.3389/fsens.2021.751748</mixed-citation><mixed-citation xml:lang="en">Gebali F., Mamun M. Review of physically unclonable functions (PUFs): Structures, models, and algorithms. Front. Sens. 2022;2:751748. https://doi.org/10.3389/fsens.2021.751748</mixed-citation></citation-alternatives></ref><ref id="cit48"><label>48</label><citation-alternatives><mixed-citation xml:lang="ru">Holcomb D.E., Burleson W.P., Fu K. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 2009;58(9):1198–1210. https://doi.org/10.1109/TC.2008.212</mixed-citation><mixed-citation xml:lang="en">Holcomb D.E., Burleson W.P., Fu K. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 2009;58(9):1198–1210. https://doi.org/10.1109/TC.2008.212</mixed-citation></citation-alternatives></ref><ref id="cit49"><label>49</label><citation-alternatives><mixed-citation xml:lang="ru">Kumar S., Guajardo J., Maes R., Schrijen G-J., Tuyls P. The butterfly PUF: protecting IP on every FPGA. In: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), Anaheim, CA, USA, June 3–4, 2008. Piscataway, NJ: IEEE; 2008. Р. 67–70. https://doi.org/10.1109/HST.2008.4559053</mixed-citation><mixed-citation xml:lang="en">Kumar S., Guajardo J., Maes R., Schrijen G-J., Tuyls P. The butterfly PUF: protecting IP on every FPGA. In: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), Anaheim, CA, USA, June 3–4, 2008. Piscataway, NJ: IEEE; 2008. Р. 67–70. https://doi.org/10.1109/HST.2008.4559053</mixed-citation></citation-alternatives></ref><ref id="cit50"><label>50</label><citation-alternatives><mixed-citation xml:lang="ru">Farha F., Ning H., Ali K., Chen L., Nugent C. SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices. IEEE Internet Things J. 2021;8(7):5904–5913. https://doi.org/10.1109/JIOT.2020.3032518</mixed-citation><mixed-citation xml:lang="en">Farha F., Ning H., Ali K., Chen L., Nugent C. SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices. IEEE Internet Things J. 2021;8(7):5904–5913. https://doi.org/10.1109/JIOT.2020.3032518</mixed-citation></citation-alternatives></ref><ref id="cit51"><label>51</label><citation-alternatives><mixed-citation xml:lang="ru">Su Y., Holleman J., Otis B. A 1.6 μJ/bit stable chip-ID generating circuit using process variations. In: Proceedings of the IEEE International Solid-State Circuits Conference (ISSCC 2007), San Francisco, CA, USA, February 11–15, 2007. Piscataway, NJ: IEEE; 2007. Р. 606–611. https://doi.org/10.1109/ISSCC.2007.373466</mixed-citation><mixed-citation xml:lang="en">Su Y., Holleman J., Otis B. A 1.6 μJ/bit stable chip-ID generating circuit using process variations. In: Proceedings of the IEEE International Solid-State Circuits Conference (ISSCC 2007), San Francisco, CA, USA, February 11–15, 2007. Piscataway, NJ: IEEE; 2007. Р. 606–611. https://doi.org/10.1109/ISSCC.2007.373466</mixed-citation></citation-alternatives></ref><ref id="cit52"><label>52</label><citation-alternatives><mixed-citation xml:lang="ru">Tehranipoor F., Karimian N., Yan W., Chandy J.A. Investigation of DRAM PUFs reliability under device accelerated aging effects. In: Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS 2017), Baltimore, MD, USA, May 28–31, 2017. Piscataway, NJ: IEEE; 2017. Р. 1–4. https://doi.org/10.1109/ISCAS.2017.8050629</mixed-citation><mixed-citation xml:lang="en">Tehranipoor F., Karimian N., Yan W., Chandy J.A. Investigation of DRAM PUFs reliability under device accelerated aging effects. In: Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS 2017), Baltimore, MD, USA, May 28–31, 2017. Piscataway, NJ: IEEE; 2017. Р. 1–4. https://doi.org/10.1109/ISCAS.2017.8050629</mixed-citation></citation-alternatives></ref><ref id="cit53"><label>53</label><citation-alternatives><mixed-citation xml:lang="ru">Yue M., Karimian N., Yan W., Anagnostopoulos N.A., Tehranipoor F. DRAM-based authentication using deep convolutional neural networks. IEEE Consum. Electron. Mag. 2021;10(4):8–17. https://doi.org/10.1109/MCE.2020.3002528</mixed-citation><mixed-citation xml:lang="en">Yue M., Karimian N., Yan W., Anagnostopoulos N.A., Tehranipoor F. DRAM-based authentication using deep convolutional neural networks. IEEE Consum. Electron. Mag. 2021;10(4):8–17. https://doi.org/10.1109/MCE.2020.3002528</mixed-citation></citation-alternatives></ref><ref id="cit54"><label>54</label><citation-alternatives><mixed-citation xml:lang="ru">Sutar S., Raha A., Raghunathan V. D-PUF: an intrinsically reconfigurable DRAM PUF for device authentication in embedded systems. In: Proceedings of the 2016 International Conference on Compilers, Architectures and Synthesis of Embedded Systems (CASES 2016), Pittsburgh, PA, USA, October 2–7, 2016. New York: ACM; 2016. Р. 1–10. https://doi.org/10.1145/2968455.2968519</mixed-citation><mixed-citation xml:lang="en">Sutar S., Raha A., Raghunathan V. D-PUF: an intrinsically reconfigurable DRAM PUF for device authentication in embedded systems. In: Proceedings of the 2016 International Conference on Compilers, Architectures and Synthesis of Embedded Systems (CASES 2016), Pittsburgh, PA, USA, October 2–7, 2016. New York: ACM; 2016. Р. 1–10. https://doi.org/10.1145/2968455.2968519</mixed-citation></citation-alternatives></ref><ref id="cit55"><label>55</label><citation-alternatives><mixed-citation xml:lang="ru">Chew Y.Y., Lim W.L., Tan J.L., Ooi C.Y. In-depth review and comparative analysis of DRAM-based PUFs. IEEE Access. 2025;13:79367–79384. https://doi.org/10.1109/ACCESS.2025.3566068</mixed-citation><mixed-citation xml:lang="en">Chew Y.Y., Lim W.L., Tan J.L., Ooi C.Y. In-depth review and comparative analysis of DRAM-based PUFs. IEEE Access. 2025;13:79367–79384. https://doi.org/10.1109/ACCESS.2025.3566068</mixed-citation></citation-alternatives></ref><ref id="cit56"><label>56</label><citation-alternatives><mixed-citation xml:lang="ru">Wilson T., Cambou B. Tamper-sensitive pre-formed ReRAM-based PUFs: Methods and experimental validation. Front. Nanotechnol. 2022;4:1055545. https://doi.org/10.3389/fnano.2022.1055545</mixed-citation><mixed-citation xml:lang="en">Wilson T., Cambou B. Tamper-sensitive pre-formed ReRAM-based PUFs: Methods and experimental validation. Front. Nanotechnol. 2022;4:1055545. https://doi.org/10.3389/fnano.2022.1055545</mixed-citation></citation-alternatives></ref><ref id="cit57"><label>57</label><citation-alternatives><mixed-citation xml:lang="ru">Napolean A., Sivamangai N.M., Sharon N., Naveen Kuma R. Review on resistive random access memory based physical unclonable function circuits for high security. Procedia Environ. Sci. Eng. Manag. 2023;10(1):41–52. URL: http://www.procedia-esem.eu/pdf/issues/2023/no1/5_Napolean_22.pdf. Дата обращения 10.07.2025. / Accessed July 10, 2025.</mixed-citation><mixed-citation xml:lang="en">Napolean A., Sivamangai N.M., Sharon N., Naveen Kuma R. Review on resistive random access memory based physical unclonable function circuits for high security. Procedia Environ. Sci. Eng. Manag. 2023;10(1):41–52. URL: http://www.procedia-esem.eu/pdf/issues/2023/no1/5_Napolean_22.pdf. Дата обращения 10.07.2025. / Accessed July 10, 2025.</mixed-citation></citation-alternatives></ref><ref id="cit58"><label>58</label><citation-alternatives><mixed-citation xml:lang="ru">Adel M.J., Rezayati M.H., Moaiyeri M.H., et al. A robust deep learning attack immune MRAM-based physical unclonable function. Sci. Rep. 2024;14:20649. https://doi.org/10.1038/s41598-024-71730-7</mixed-citation><mixed-citation xml:lang="en">Adel M.J., Rezayati M.H., Moaiyeri M.H., et al. A robust deep learning attack immune MRAM-based physical unclonable function. Sci. Rep. 2024;14:20649. https://doi.org/10.1038/s41598-024-71730-7</mixed-citation></citation-alternatives></ref><ref id="cit59"><label>59</label><citation-alternatives><mixed-citation xml:lang="ru">Go S.X., Wang Q., Lim K.G., Lee T.H., Bajalovic N., Loke D.K. Ultrafast near-ideal phase-change memristive physical unclonable functions driven by amorphous state variations. Adv. Sci. (Weinh.) 2022;9(36):e2204453. https://doi.org/10.1002/advs.202204453</mixed-citation><mixed-citation xml:lang="en">Go S.X., Wang Q., Lim K.G., Lee T.H., Bajalovic N., Loke D.K. Ultrafast near-ideal phase-change memristive physical unclonable functions driven by amorphous state variations. Adv. Sci. (Weinh.) 2022;9(36):e2204453. https://doi.org/10.1002/advs.202204453</mixed-citation></citation-alternatives></ref><ref id="cit60"><label>60</label><citation-alternatives><mixed-citation xml:lang="ru">Yang J., Lei D., Chen D., Li J., Jiang H., Luo Q., et al. Machine-learning-resistant 3D PUF with 8-layer stacking vertical RRAM and 0.014% bit error rate using in-cell stabilization scheme for IoT security applications. In: 2020 IEEE International Electron Devices Meeting (IEDM), San Francisco, CA, USA, December 12–18, 2020. Piscataway, NJ: IEEE; 2020. Р. 28.6.1–28.6.4. https://doi.org/10.1109/IEDM13553.2020.9372107</mixed-citation><mixed-citation xml:lang="en">Yang J., Lei D., Chen D., Li J., Jiang H., Luo Q., et al. Machine-learning-resistant 3D PUF with 8-layer stacking vertical RRAM and 0.014% bit error rate using in-cell stabilization scheme for IoT security applications. In: 2020 IEEE International Electron Devices Meeting (IEDM), San Francisco, CA, USA, December 12–18, 2020. Piscataway, NJ: IEEE; 2020. Р. 28.6.1–28.6.4. https://doi.org/10.1109/IEDM13553.2020.9372107</mixed-citation></citation-alternatives></ref><ref id="cit61"><label>61</label><citation-alternatives><mixed-citation xml:lang="ru">Li J., Cui Y., Gu C., Wang C., Liu W., Kvatinsky S. A highly reliable dual-mode RRAM PUF with key concealment scheme. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2025. https://doi.org/10.1109/TCAD.2025.3536376</mixed-citation><mixed-citation xml:lang="en">Li J., Cui Y., Gu C., Wang C., Liu W., Kvatinsky S. A highly reliable dual-mode RRAM PUF with key concealment scheme. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2025. https://doi.org/10.1109/TCAD.2025.3536376</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
