I. Introduction
Security in hardware implementations has increasingly pervaded throughout the connected world with different IoT applications and well-funded adversaries, where the separation between hacker groups and nation-state organizations has already vanished. Physical Unclonable Functions (PUFs), as one of the lightweight security primitives, are being used in IoT systems to defend against various attacks and boost the security in the form of multiple applications like key generation processes or authentication protocols [1]. PUFs exploit the inherent unpredictable physical characteristics of, e.g., silicon [2]. More precisely, these random characteristics come from the subtle mismatches during the Integrated Circuit (IC) manufacturing processes and are unique to every device. They are often called the fingerprint of the device. Among various types of PUFs, silicon PUFs [2] are applied more extensively in research and applications as they can query Challenge-Response Pairs (CRPs) within the chip without requiring any analog signal [3]. Ideally a PUF generates a reliable, unique, and unpredictable response