Tuyls, Pim; Šcorić, Boris; Kevenaar, Tom (2007). Security with Noisy Data: Private Biometics, Secure Key Storage and Anti-counterfeiting. Springer. doi:10.1007/978-1-84628-984-2. ISBN978-184628-983-5.
McGrath, Thomas; Bagci, Ibrahim E.; Wang, Zhiming M.; Roedig, Utz; Young, Robert J. (2019). A PUF taxonomy. Applied Physics Reviews. 6 (11303): 011303. doi:10.1063/1.5079407.
Merli, Dominik; Schuster, Dieter; Stumpf, Frederic; Sigl, Georg (2011), Side Channel Analysis of PUFs and Fuzzy Extractors, Trust and Trustworthy Computing. 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings, Lecture Notes in Computer Science, т. 6740, Springer Berlin Heidelberg, с. 33—47, doi:10.1007/978-3-642-21599-5_3, ISBN978-3-642-21598-8