C. Bösch, J. Guajardo, and A. Sadeghi, Jamshid Shokrollahi, and Pim Tuyls. Efficient helper data key extractor on FPGAs, CHES, vol.5154, pp.181-197, 2008.

Z. Cherif, J. Danger, S. Guilley, and L. Bossuet, An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF, 2012 15th Euromicro Conference on Digital System Design, pp.156-162, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00753216

J. Delvaux, D. Gu, and I. Verbauwhede, Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp.1-6, 2016.

Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, EUROCRYPT, vol.3027, pp.523-540, 2004.

, E-safety vehicle intrusion protected applications

B. Gassend, D. Clarke, M. Van-dijk, and S. Devadas, Delay-based circuit authentication and applications, Proceedings of the 2003 ACM Symposium on Applied Computing, pp.294-301, 2003.

. Iso/iec, Information technology -security techniques -security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters, 20897.

S. Katzenbeisser, Ü. Kocaba?, V. Ro?i?, A. Sadeghi, I. Verbauwhede et al., PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon, pp.283-301, 2012.

R. Maes, A. Van-herrewege, and I. Verbauwhede, PUFKY: A fully functional PUF-based cryptographic key generator, CHES 2012, pp.302-319, 2012.

N. Bruneau, Development of the unified security requirements of PUFs during the standardization process, SecITC, vol.11359, pp.314-330, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02265318

B. Donald and . Owen, Tables for computing bivariate normal probabilities, The Annals of Mathematical Statistics, vol.27, issue.4, pp.1075-1090, 1956.

O. Rioul, P. Solé, S. Guilley, and J. Danger, On the entropy of physically unclonable functions, 2016 IEEE International Symposium on Information Theory (ISIT), pp.2928-2932, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02288459

A. Schaub, J. Danger, S. Guilley, and O. Rioul, An improved analysis of reliability and entropy for delay PUFs, DSD, pp.553-560, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02288537

A. Schaub, O. Rioul, and J. J. Boutros, Entropy estimation of physically unclonable functions via Chow parameters, 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.698-704, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02300791

P. Boris?koric, W. Tuyls, and . Ophey, Robust key extraction from physical uncloneable functions, Applied Cryptography and Network Security, vol.3531, pp.407-422, 2005.

M. Yu and S. Devadas, Recombination of physical unclonable functions, 35th Annual GOMACTech Conference, 2010.