# Entropy Estimation of Physically Unclonable Functions via Chow Parameters

A physically unclonable function (PUF) is an electronic circuit that produces an intrinsic identifier in response to a challenge. These identifiers depend on uncontrollable variations of the manufacturing process, which make them hard to predict or to replicate. Various security protocols leverage on such intrinsic randomness for authentification, cryptographic key generation, anti-counterfeiting, etc. Evaluating the entropy of PUFs (for all possible challenges) allows one to assess the security properties of such protocols. In this paper, we estimate the probability distribution of certain kinds of PUFs composed of n delay elements. This is used to evaluate relevant Rényi entropies and determine how they increase with n. Such a problem was known to have extremely high complexity (in the order of 2^2^n) and previous entropy estimations were carried out up to n=7. Making the link with the theory of Boolean threshold functions, we leverage on the representation by Chow parameters to estimate probability distributions up to n=10. The resulting Shannon entropy of the PUF is close to the max-entropy, which is asymptotically quadratic in n.

Comments

There are no comments yet.

## Authors

• 1 publication
• 12 publications
• 4 publications
• 9 publications
• ### Transient Response of Hybrid Boolean Networks as Physical Unclonable Functions

Physical unclonable functions are devices that exploit small, random var...
07/29/2019 ∙ by Daniel Canaday, et al. ∙ 0

read it

• ### Entropy, neutro-entropy and anti-entropy for neutrosophic information

This approach presents a multi-valued representation of the neutrosophic...
06/18/2017 ∙ by Vasile Patrascu, et al. ∙ 0

read it

• ### Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

Encryption has increasingly been used in all applications for various pu...
12/16/2017 ∙ by Shoufu Luo, et al. ∙ 0

read it

• ### On the Distribution of Random Geometric Graphs

Random geometric graphs (RGGs) are commonly used to model networked syst...
01/15/2018 ∙ by Mihai-Alin Badiu, et al. ∙ 0

read it

• ### Physically Unclonable Functions and AI: Two Decades of Marriage

The current chapter aims at establishing a relationship between artifici...
08/26/2020 ∙ by Fatemeh Ganji, et al. ∙ 0

read it

• ### Symbolic Execution + Model Counting + Entropy Maximization = Automatic Search Synthesis

We present a method of automatically synthesizing steps to solve search ...
09/23/2020 ∙ by Mara Downing, et al. ∙ 0

read it

• ### Coalgebraic Tools for Randomness-Conserving Protocols

We propose a coalgebraic model for constructing and reasoning about stat...
07/08/2018 ∙ by Dexter Kozen, et al. ∙ 0

read it

##### This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

## I Introduction

Physically unclonable functions, or PUFs, are electronic devices that are used to produce unique identifiers. Small variations of the manufacturing process are exploited so that any two devices, built according to the same description, will likely produce different identifiers. Moreover, since such process variations are intrinsically random, they cannot be controlled to replicate the behavior of another device, hence the name physically unclonable functions. PUFs find many applications: the identifier can be used to generate a unique cryptographic key, which cannot be easily extracted from the device; it can be recorded during manufacturing into a whitelist to prevent counterfeiting or overproduction; and it can also be employed in the implementation of challenge-response protocols at a low cost. This is especially valuable on devices where implementing asymmetric cryptography primitives is too computationally expensive.

There are several ways to build PUFs. SRAM-PUFs [1] exploit the states of SRAM cells after powering up, while ring-oscillator (RO) PUFs [2] exploit delay differences of signals in electronic circuits. In this paper, we analyze another delay PUF, called loop-PUF, first proposed in [3]. Our analysis will also be valid for the RO-sum PUF [4], which shares essentially the same mathematical model, as well as the arbiter PUF [5]. In the remainder of this paper, we will write PUF as a short-hand for loop-PUF, RO-sum PUF or arbiter PUF.

### I-a Modelization and Notations

A PUF of size generates one identifier bit, or response bit, when queried with a challenge , a sequence of values or . The PUF is characterized by weights, denoted by that represent delay differences of the PUF circuit. As explained in [6], for each challenge , the response bit of the PUF of parameters is equal to .

The base for all logarithms in this paper is equal to , and all entropies are given in bits.

Due to manufacturing process variations, the weights

are modeled as realizations of random variables

. In [6], a Gaussian model was analyzed, where the Gaussian nature of the variables is justified by simulations of process variations in electronic circuits [7].

More generally, our analysis is valid for any whose components are i.i.d. continuous variables with symmetric densities about (whose support contains ). The i.i.d. assumption is justified by the fact that delays are caused by “identical” circuit elements that lie in different locations in the circuit and can, therefore, be considered independent. In particular, each is the difference between two delays caused by such “identical” independent elements, which justifies the symmetry assumption. Simulations in Section V will be made in the Gaussian model, for which the weight distribution is centered isotropic.

### I-B Problem Statement

The security of PUFs is related to Rényi entropies of various orders  [8].

The min-entropy is related to the maximum (worst-case) probability of successfully cloning a given PUF. Therefore, min-entropy should be as large as possible to ensure a given worst-case security level.

The collision entropy is related to the average probability that two randomly chosen PUFs have the same identifier. Therefore, should also be as large as possible to ensure a given average security level against collision.

The classical Shannon’s entropy is known to provide a resistance criterion against modeling attacks—which predict the response to a new challenge given previous responses to other challenges [9]. Again should be as large as possible.

The max-entropy is simply the logarithm of the total number of PUFs. upper bounds all the other entropies . Theoretically, it is possible to choose a non i.i.d. weight distribution such that all PUFs are equiprobable, yielding for every . In this case it is sufficient to count PUFs. In practice, however, due to the assumption of i.i.d. weights (typically Gaussian), the upper bound will not be attained. Therefore, it is important to derive a efficient method to estimate the various Rényi entropies.

Estimating the various Rényi entropies typically requires estimating the entire PUF probability distribution. However, because a PUF of size is determined by response bits, there can be as many as PUFs of size . The naive complexity increases very rapidly with , in the order of .

### I-C Outline

In this paper, we link the analysis of PUFs to the theory of Boolean Threshold Functions (BTF) and build an algorithm that accurately estimates the PUF probability distribution and entropies up to order . Our algorithm relies on determining equivalent classes of PUFs with the same probability, and then estimating the probability within each class. The classes are determined using Chow parameters from BTF theory. The remainder of the paper is thus organized as follows. Section II recalls known results from the theory of BTFs which we adapt to PUFs. The key results on the equivalence classes are proved in Section III. Section IV describes the simulation algorithm that allows us in Section V to determine the PUF distributions and entropies up to order . Finally, Section VI concludes.

## Ii The Chow Parameters of PUFs

###### Definition 1 (Puf)

Let be such that for all , . The PUF of size and weight sequence is the function defined as

 fx(c)=sgn(c⋅x) (1)

where is the usual scalar product.

This definition coincides with so-called “self-dual” BTFs of variables [10]. BTFs have been studied since the 1950’s as building blocks for Boolean circuits [11]

and also find applications in machine learning

[12]. Leveraging the correspondence between PUFs and BTFs, we adapt fundamental results from BTF theory to conveniently characterize PUFs.

### Ii-a All PUFs are Attainable

Recall that in our framework, the PUF parameters

are realizations of a random vector

. Under this probabilistic model a PUF becomes a randomized mapping such that for any (deterministic) challenge .

###### Lemma 1

For every PUF , we have .

In other words, every PUF can be reached by a realization of weights with positive probability (even though one has ).

By assumption all components of are i.i.d. with symmetric density of support containing . Hence the support of the density of is an -dimensional manifold containing the origin in its interior. Let be fixed and let be the cone (scale-invariant set) of all such that . This cone has apex and contains the intersection of all half-spaces where . Therefore, it is a -dimensional manifold which intersects with positive volume. Hence .

### Ii-B Chow Parameters Characterize PUFs

First introduced by Chow [13] and later studied by Winder [11] who gave them their name, the so-called Chow parameters uniquely define a Boolean threshold function. Their definition is especially simple for PUFs:

###### Definition 2 (Chow parameters)

The Chow parameters of a PUF of size  is defined as

 p=∑c∣f(c)=1c (2)

where the vector sum is carried out componentwise.

We remark that for , all Chow parameters are even integers. This is due to the fact that a sum of even number of elements must be even. More precisely,

 pimod2 ≡∑c∣f(c)=1cimod2≡∑c∣f(c)=11mod2 (3) ≡2n−1mod2≡0mod2. (4)
###### Theorem 1 (Chow’s theorem [13])

Two PUFs with the same Chow parameters are identical.

For completeness, we give a new proof of Chow’s theorem rewritten in our PUF framework. Such proof turns out to be very simple.

Let and be two PUFs with identical Chow parameters:

 \smashoperator[]∑c∣fx(c)=1c =\smashoperator[]∑c∣fy(c)=1c. (5)

Simplifying this expression by , we obtain

 ∑c∣fx(c)=1,fy(c)=−1c  =∑c∣fx(c)=−1,fy(c)=1c, (6)

which is equivalent to

 \smashoperator[]∑c∣fx(c)≠fy(c)fx(c)c=0. (7)

Taking the scalar product with , we get

 ∑c∣fx(c)≠fy(c)fx(c)c⋅x=∑c∣fx(c)≠fy(c)|c⋅x|=0 (8)

which implies whenever . Now we assumed that is never zero by Def. 1. Thus .

### Ii-C Consequence on the Max-Entropy

An upper bound on the max-entropy can be easily deduced from Chow’s theorem.

###### Corollary 1

There are no more than PUFs of size , i.e., the max-entropy of the PUF of size satisfies

 H0(n)≤n2(∀n≥2). (9)

A more refined version, which can be rewritten as for , can be found in [14, Corollary 10.2]. The proof of (9) is again particularly simple for PUFs.

The Chow parameters , , satisfy

 pi=∑c∣f(c)=1ci≤∑c∣f(c)=1,ci=11≤2n−1 (10)

and similarly, . Since there are even integers between and , there can only be different values taken by the Chow parameters. The conclusion follows from Chow’s Theorem 1.

A lower bound on is also easily found from the representation of Definition 1, as given by the following Proposition. The corresponding bound for the number of BTFs was first established independently by Smith [15] and Yajima et al. [16] in the 1960s.

###### Proposition 1

The max-entropy satisfies

 H0(n)>(n−2)22(∀n≥2). (11)

Recall from Lemma 1 that every PUF can be reached by a realization of weights with positive probability. Hence it is sufficient to consider all for all in order to lower-bound the total number of PUFs.

Let a PUF of size . Applying some small perturbation on if necessary (without affecting ) we may always assume that all the () take distinct values.

Now let be such that is different from all the , and define . For any challenge , we have

 fx′(c′)={fx(c1,…,cn) if cn=cn+1sgn(∑ni=1cixi−2cnxn+1) otherwise.% (12)

Depending on how many of the values of are smaller/larger than , we can construct different PUF functions of size . Hence each PUF of size gives rise to more than PUFs of size . Therefore, . The result follows by finite induction:

 H0(n)>(n−1)(n−2)2+H0(2)>(n−2)22.

More recently, Zuev [17] has shown that, asymptotically, . Therefore, for the max-entropy, we have that . As a result, instead of evaluating the probabilities of different PUFs, we will only have to evaluate about .

As apparent in the proof of Zuev [17, Theorem 1]

although through different geometrical considerations on normal vectors of hyperplanes, we can further reduce the number of PUFs to be considered down by a factor of about

. Section III will derive the exact compression factor using the equivalence classes on Chow parameters.

### Ii-D Order and Sign Stability of Chow Parameters

An important property of the Chow parameters is that their share the same signs and relative order as the weights .

###### Lemma 2

Let be a PUF with weight , and be the corresponding Chow parameters. Then

• and .

• .

A similar result was shown by Chow in [13], although with another definition of Chow parameters. Again we give a simplified proof in the PUF framework.

We first prove that , the other case being similar. Suppose that . Let (resp. ) be the set (resp. ). By definition,

 pi=∑c∣f(c)=1ci=|E+i|−|E−i|. (13)

We show the existence of an injective mapping from to . Consider the one-to-one mapping defined by

 ϕ(c)j={−cj,j≠i−cj,j=i (14)

For any , , and

 n∑j=1ϕ(c)jxj =n∑j≠icjxj+xi (15) =n∑j=1cjxj>0+2xi≥0>0. (16)

Therefore, and . Hence, the bijection  induces an injection from to . This implies that hence .

To prove the second part, assume that for . Let be a PUF given by , where is obtained from by dropping , for any , and . Say the Chow parameters of is . According to the first part of this lemma, we have . Now, expand the expression of as

 pj−pi =∑c∣f(c)=1cj−∑c∣f(c)=1ci (17) =2∑c∣f(c)=1,cj=−cicj (18) =2∑c′∣f′(c′)=1c′j=2p′j≥0. (19)

## Iii Equivalence Classes and Chow Parameters

Since the are i.i.d. symmetric random variables, the joint probability distribution of the weights is invariant under permutations and sign changes. Therefore, all PUFs that can be obtained from one another by permuting or changing signs of their weights can be clustered together into equivalence classes of PUFs with the same probability .

We now establish several properties of these equivalence classes for PUFs, known as “self-dual” classes [10] in the context of BTFs. Zuev [17] had already mentioned elements per class in a special case. Our generalization (Theorem 3) is mentionned in a different form in [18, § 3.1.2] for calculating the total number of BTFs, yet we couldn’t find formal proofs published in the literature.

We give a formal definition of the equivalence classes by the action of the group

 Gn=Sn×{−1,+1}n (20)

where is the symmetric group of order . An element is determined by the permutation and the sign changes .

###### Proposition 2

For any and define such that

 (g⋅x)i=sixσ(i). (21)

This defines a group action of on , where the inner product in is defined by

 (σ1,s1)⋅(σ2,s2)=(σ1∘σ2,(s1is2σ1(i))i). (22)

is clearly a group with identity . For any and ,

 (σ1,s1)⋅((σ2,s2)⋅x) =(σ1,s1)⋅(s2ixσ2(i))i (23) =(s1is2σ1(i)xσ1(σ2(i)))i (24) =(σ1∘σ2,(s1is2σ1(i))i)⋅x (25) =((σ1,s1)⋅(σ2,s2))⋅x. (26)

This shows that defines a group action of on .

Thus we can say that the group acts on the PUFs of size , the action being defined as

 g⋅fx=fg⋅x. (27)

In keeping with Lemma 2, we now show that the group action is carried over to Chow parameters:

###### Theorem 2

Let a PUF of Chow parameters , and let . The Chow parameters of is .

Let . For any challenge , we have that . Thus,

 ∑c∣fg⋅x(c)=1ci =∑c∣fx(g−1⋅c)=1ci=∑c∣fx(c)=1(g⋅c)i (28) =∑c∣fx(c)=1sicσ(i)=sipσ(i)=(g⋅p)i. (29)

Changing the signs of the weights or permuting them is reflected by the same operation on the Chow parameters. This allows us to compute the size of the equivalence classes:

###### Theorem 3

Let be a PUF with Chow parameters . Let be the number of Chow parameters equal to , and let the orbit of by , that is, the equivalence class containing . Then

 |Orb(f)|=2nn!(2mp(0)∏k∈Zmp(k)!)−1. (30)

By applying the well-known orbit-stabilizer theorem (see for instance [19, p. 89]), we have

 |Orb(f)|=|Gn||Stab(f)|=|{±1}n|×|Sn||Stab(f)|=2nn!|Stab(f)| (31)

where is the stabilizer of . The size of the orbit of can therefore be deduced from the size of its stabilizer. Now the latter can be easily computed: Let such that . Since , we have and . The number of such is exactly .

## Iv Monte-Carlo Algorithm

As seen in the introduction to the previous section, all PUFs in one equivalence class have the same probability. It follows that the probability of any particular PUF can be deduced from the probability of the class to which it belongs. Therefore, to determine the various entropies, it suffices to find a method that estimates the probabilities of the various equivalence classes.

In this section, we propose an algorithm that exploits a definition of a canonical PUF in any equivalence class in such a way that for given any PUF, it is trivial to determine the corresponding canonical PUF. As expected, only about probabilities need to be estimated, instead of approximatively .

###### Definition 3 (Canonical PUF)

A canonical PUF of variables is a PUF whose Chow parameters satisfy

 p1≥p2≥⋯≥pn≥0. (32)

The canonical form of a PUF is the canonical PUF belonging to the same class, i.e., where is such that is canonical.

This notion was first introduced by Winder [11] and is related to the concept of “prime” functions independently studied by Chow [13].

###### Proposition 3 (Unicity of the canonical PUF)

Two canonical PUFs in the same class are equal.

Since and are in the same equivalence class, their Chow parameters are identical up to sign changes and order. Since both are canonical, the signs and order are fixed. Their Chow parameters are thus identical and .

###### Proposition 4

Let be a weight sequence of a PUF , and let such that satisfies

 x′1≥x′2≥…≥x′n≥0. (33)

Then is the canonical form of the PUF .

Let us denote by (resp ) the Chow parameters of (resp ). The PUF obtained from weights is . From Lemma 2, the satisfy the same ordinal relations and have the same signs as the . Therefore, is a canonical PUF.

These results allow us to efficiently estimate the PUF distribution by Monte-Carlo methods, as described in Algorithm 1. Such an algorithm can be used for any i.i.d. weight distribution with symmetric densities (not necessarily Gaussian).

## V Entropies Estimation

In this section, we present the simulation results in the Gaussian case where the weights are i.i.d. . Exact values were already determined up to in [20].

### V-a Estimating the Max-Entropy H0

According to Lemma 1, every PUF can be attained by some realization of weights. Therefore, the max-entropy of the PUF distribution is simply the logarithm of the total number of PUFs with weights. This number is equal to the total number of BTFs of variables and has been computed up to in [18, § 3.1.2], see Table I.

### V-B Estimating the Shannon Entropy H1

For any PUF , let denote the equivalence class of  with cardinality , its probability, the set of all PUFs and the quotient group induced by the action of the group . Then, letting , one has

 H1(n) =−∑f∈FnP(f)log(P(f)) (34) =−∑f′∈Fn/Gn∑f∈[f′]P(f)log(P(f)) (35) =−∑f′∈Fn/GnP([f′])log(P(f′)) (36) =−∑f′∈Fn/GnP([f′])log(P([f′]))+E[log(|[fX]|)]. (37)

In other words, the Shannon entropy of the PUF distribution is simply the sum of the entropy of the equivalence classes and the average of their logarithmic size. The latter term can be estimated using the unbiased empirical mean, where a confidence interval can be determined using Student’s t-distribution

[21]

. The former term, however, is an entropy, for which no unbiased estimator exists

[22]. The NSB estimator [23]

has a reduced bias and a low variance. However, because we generated much more PUFs than equivalence classes (by a factor of at least 100000), the plug-in estimator, based on the empirical frequency estimates, performs quite well: Its bias can be upper bounded as described in

[22] and was found to be less than bit. The results are summarized in Table II.

### V-C Estimating the Collision Entropy H2

The collision entropy was estimated using an unbiased estimator adapted from [24, § 1.4.2]. Let be the number of PUF samples that belong to the equivalence class of

among a number of Poisson-distributed PUFs with parameter

, and . We can compute

 E[∑f∈Fn/GnN2–[f]|[f]|N2] =∑f∈Fn/GnE[N2–[f]N2]1|[f]| (38) =∑f∈Fn/GnP([f])2|[f]| (39) =∑f∈FnP(f)2 (40)

where we used the fact that from [24, § 2.2]. It follows that

 ∑f∈Fn/GnN2–[f]|[f]|N2. (41)

is an unbiased estimator for the power-sum . As can be also checked, the variance of this estimator admits the same upper bound as the one described in [24, § 1.4.2]. This allows us to determine confidence intervals for the collision entropy as shown in Table III.

### V-D Estimating the Min-Entropy H∞

In order to determine the min-entropy of the PUF distribution, one needs to estimate the probability of the most likely PUF. Our experiments, as well as those of Delvaux et al. [25]

, strongly suggest that for a Gaussian distribution of the weights, the most likely PUFs are the

PUFs corresponding to the Boolean functions and , .

The maximum likelihood estimator of that probability is simply the sample frequency, which is an unbiased estimator. A confidence interval for this estimator can be obtained using the Wilson score interval [26], which yields a confidence interval for the min-entropy .

Because we have already determined that there are exactly PUFs in the equivalence class of the most likely PUF, we only need to estimate a confidence interval on the sample frequency of the equivalence class. Once such an interval was obtained, for instance , then the confidence interval for the min-entropy is given by

 [−log2(p+)+log2(2n),−log2(p−)+log2(2n)].

The confidence intervals of the min-entropy are presented in Table IV.

The results of the simulation, up to , are presented in Figure 1. The results show that the Shannon entropy is close to the max-entropy, which as seen in Section II is asymptotically equivalent to as increases.

## Vi Conclusions and perspectives

While it had been previously shown [6] that the entropy of the loop-PUF of elements could exceed , the exact values were only known for very small values of . Making the link with BTF theory using Chow parameters, we have extended these results to provide accurate approximations up to . Our results suggest that the entropy of the loop-PUF might be quadratic in : This would be a very positive result for circuit designers, since it implies that the PUF has a very good resistance to machine learning attacks. However, because the min-entropy and collision entropy are much smaller (on the order of ) the resistance to cloning may not be as high as expected.

Two interesting theoretical aspects of the PUF entropy are still open: First, to what extent does the entropy of the PUF stay close to the max-entropy for larger values of ? Second, is it possible to obtain a quasi-quadratic entropy in when choosing a small subset of all possible challenges? The latter point is of great practical interest since it would reduce the time required to obtain the PUF identifier while maintaining a high resistance to machine learning attacks.

For values of larger than , our method seems to become too costly in space and time to produce accurate estimates of the PUF probability distributions under reasonable conditions. One could perhaps have recourse to entropy estimation methods that dispense with learning the distribution itself, such as the NSB estimation [23]. This could be used to check the predicted trend of the PUF entropy for increasing .

## Acknowledgment

The authors would like to thank Prof. Gadiel Seroussi, who first suggested a possible link between our problem and BTF theory at the LAWCI’18 conference in Campinas, Brazil.

## References

• [1] D. E. Holcomb, W. P. Burleson, and K. Fu, “Power-up SRAM state as an identifying fingerprint and source of true random numbers,” IEEE Transactions on Computers, vol. 58, no. 9, pp. 1198–1210, 2009.
• [2] G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication and secret key generation,” in 44th ACM/IEEE Design Automation Conference, 2007, pp. 9–14.
• [3] Z. Cherif, J.-L. Danger, S. Guilley, and L. Bossuet, “An easy-to-design PUF based on a single oscillator: The Loop PUF,” in 15th Euromicro Conference on Digital System Design (DSD).   IEEE, 2012, pp. 156–162.
• [4] M.-D. M. Yu and S. Devadas, “Recombination of physical unclonable functions,” in 35th Annual GOMACTech Conference, 2010.
• [5] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Delay-based circuit authentication and applications,” in Proceedings of the 2003 ACM Symposium on Applied Computing.   ACM, 2003, pp. 294–301.
• [6] O. Rioul, P. Solé, S. Guilley, and J.-L. Danger, “On the entropy of physically unclonable functions,” in IEEE International Symposium on Information Theory (ISIT), July 2016, pp. 2928–2932.
• [7] H. Chang and S. S. Sapatnekar, “Statistical timing analysis considering spatial correlations using a single PERT-like traversal,” in Proceedings of the 2003 IEEE/ACM International Conference on Computer-Aided Design.   IEEE Computer Society, 2003, p. 621.
• [8] A. Rényi, “On measures of entropy and information,” in Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability.   Berkeley: University of California Press, 1961.
• [9] A. Vijayakumar, V. C. Patil, C. B. Prado, and S. Kundu, “Machine learning resistant strong PUF: Possible or a pipe dream?” in IEEE International Hardware Oriented Security and Trust, 2016, pp. 19–24.
• [10] E. Goto and H. Takahasi, “Some theorems useful in threshold logic for enumerating boolean functions.” in IFIP Congress, 1962, pp. 747–752.
• [11] R. O. Winder, “Single stage threshold logic,” in Symposium on Switching Circuit Theory and Logical Design.   IEEE, 1961, pp. 321–332.
• [12]

T. M. Cover, “Geometrical and statistical properties of systems of linear inequalities with applications in pattern recognition,”

IEEE Transactions on Electronic Computers, no. 3, pp. 326–334, 1965.
• [13] C.-K. Chow, “On the characterization of threshold functions,” in Symposium on Switching Circuit Theory and Logical Design, 1961, pp. 34–38.
• [14] S.-T. Hu, Threshold Logic.   Univ of California Press, 1965.
• [15] D. R. Smith, “Bounds on the number of threshold functions,” IEEE Transactions on Electronic Computers, no. 3, pp. 368–369, June 1966.
• [16] S. Yajima and T. Ibaraki, “A lower bound of the number of threshold functions,” IEEE Transactions on Electronic Computers, vol. EC-14, no. 6, pp. 926–929, Dec 1965.
• [17] Y. A. Zuev, “Methods of geometry and probabilistic combinatorics in threshold logic,” Discrete Mathematics and Applications, vol. 2, no. 4, pp. 427–438, 1992.
• [18] N. Gruzling, “Linear separability of the vertices of an -dimensional hypercube,” Master’s thesis, University of Northern British Columbia, 2008.
• [19] T. W. Hungerford, Algebra, ser. Graduate Texts in Mathematics.   New York: Springer-Verlag, 1980, vol. 73.
• [20] A. Schaub, O. Rioul, J. J. Boutros, J.-L. Danger, and S. Guilley, “Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem,” Latin American Week on Coding and Information, UNICAMP-Campinas, Brazil, pp. 22–27, 2018.
• [21] Student, “The probable error of a mean,” Biometrika, pp. 1–25, 1908.
• [22] L. Paninski, “Estimation of entropy and mutual information,” Neural computation, vol. 15, no. 6, pp. 1191–1253, 2003.
• [23] I. Nemenman, F. Shafee, and W. Bialek, “Entropy and inference, revisited,” in Advances in Neural Information Processing Systems, 2002, pp. 471–478.
• [24] J. Acharya, A. Orlitsky, A. T. Suresh, and H. Tyagi, “The complexity of estimating Rényi entropy,” in Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms.   SIAM, 2014, pp. 1855–1869.
• [25] J. Delvaux, D. Gu, and I. Verbauwhede, “Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs,” in Hardware-Oriented Security and Trust (AsianHOST), IEEE Asian.   IEEE, 2016, pp. 1–6.
• [26] E. B. Wilson, “Probable inference, the law of succession, and statistical inference,” Journal of the American Statistical Association, vol. 22, no. 158, pp. 209–212, 1927.