. Menezes, . Oorschot, and . Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

M. Laban and M. , Low-cost ARM Cortex-M0 Based TRNG for IoT Applications, Acta Electrotechnica et Informatica, vol.18, issue.1, pp.52-56, 2018.
DOI : 10.15546/aeei-2018-0008

. Ch, M. Bohm, and . Hofer, Physical Unclonable Functions in Theory and Practice, p.4, 2013.

B. Colombier, U. Mureddu, M. Laban, O. Petura, L. Bossuet et al., Complete activation scheme for FPGA-oriented IP cores design protection, 2017 27th International Conference on Field Programmable Logic and Applications (FPL), p.2017
DOI : 10.23919/FPL.2017.8056772

URL : https://hal.archives-ouvertes.fr/ujm-01588947

Z. Paral and S. Devadas, Reliable and efficient PUF-based key generation using pattern matching, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 2011.
DOI : 10.1109/HST.2011.5955010

, International Organization for Standardization Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters, ISO/IEC NP 20897, Available online: https

H. Project and W. Page, available: https://hector-project

M. Laban, Development tools for evaluation of cryptographic primitives implemented in reconfigurable hardware, pp.1-91, 2016.

F. Kodytek and R. Lorencz, A Design of Ring Oscillator Based PUF on FPGA, 2015 IEEE 18th International Symposium on Design and Diagnostics of Electronic Circuits & Systems, p.2015
DOI : 10.1109/DDECS.2015.21

. Nartional-institute, Side-Channel Attack Standard Evaluation Board SASEBO, available online

K. Velegalati, . Towards, and . Flexible, Opensource BOard for Side-channel analysis (FOBOS), available online: https://cryptography.gmu

L. Hubert-curien and . Evariste-wiki-page,