“…Hence, depending on the target application, some designers have tried to design their protocol using only bit-wise operations and bit-wise permutation functions, e.g. [11], [3], [26], [27], and some other tried to use more sound components such as hash functions, e.g. [28], Physically Unclonable Functions (PUF), e.g.…”