Abstract: Reconfigurable systems often require secret keys for encrypting and decrypting data. To address this need, applications requiring high security typically use physical unclonable functions ...