“…We consider the following list of strong PUF protocols, all described with a unified notation for ease of understanding: basic strong PUF authentication [45], controlled PUFs [15], Bolotnyy et al [4],Öztürk et al [44], Hammouri et al [18], Kulseng et al [33], Sadeghi et al [53], logically reconfigurable PUFs [29], reverse fuzzy extractors [59], the converse protocol [30], Lee et al I [35], Jin et al [23], slender PUFs [40], Xu et al [60], He et al [19], Jung et al [24], Lee et al II [36], noise bifurcation [61] and system of PUFs [31].…”