“…However, given that the obfuscation mechanism is not proven to be stronger than for two pioneering proposals, i.e., Slender PUFs by Rostami et al [20] and Noise Bifurcation PUFs by Yu et al [25], both of which were broken by Becker and Tobisch [6], [7] even when instantiated with a (costly) 4-XOR PUF, it is unclear why one or more non-XORed Arbiter PUFs would suddenly suffice. • For the RPUF protocol [10], [22], the exploitation of its LFSR is not unexpected, given that Delvaux et al [4,Chapter 5] previously reported similar problems for other PUF-based authentication protocols. The most notable resemblance is to the protocol of Van Herrewege et al [31], where an attacker also takes advantage of the LFSR by generating overlapping challenge streams.…”