“…It is di cult to nd a single and consistent denition of PUF in the literature [117]. However, a property description de nition of the PUF is provided by Gassend et al in [116]. Usual applications of the PUF described in the literature are in anti-counterfeiting [118], Intellectual Property protection [119] [121], tamper-evident hardware [122], hardware based cryptography [60,123] [125] and secure/trusted processors [126].…”