Hardware authentication based on PUFs and SHA-3 2<sup>nd</sup> round candidates | Publicación