“…A number of protocols using CPUFs were already proposed in [11] and more elaborate protocols were discussed in [46]. It must be stressed that the enhanced security of a CPUF strongly depends on the physical linking of the PUF with the access algorithms which can be very arbitrary and might be the weak point of a CPUF.…”