According to recent estimates, [1] the looming internet of things and worldwide information exchange by the year 2018-2023 will produce a global data stream of around tens zettabytes per annum. This requires secure and reliable authentication methods in order to protect private information and to safeguard access to personal devices and services. The currently widespread techniques to this end rely on the permanent storage of digital secret keys in electronic devices, for example, in smartphones, car keys, bank cards, passports, or computers. Unfortunately, the last decades have seen an explosion of attacks that can extract such keys unnoticedly, including sophisticated malware and physical methods. [2][3][4] This obviously calls for new authentication approaches with improved security features.The use of nondigital primitives such as physical unclonable functions (PUFs) constitutes a promising new avenue in this context. [5][6][7][8] PUFs are randomly structured physical systems which exhibit a complex input-output or, in PUF parlance, "challenge-response" behavior that is unique to each PUF. Their uncontrollable individual disorder on small length scales makes them practically unclonable, even for their original manufacturer. Due to their physical nature, randomness, and unclonability, PUFs can disable various popular attack vectors compared to classical, permanently stored keys: For example, their physical nature obviously prevents that PUFs are stolen remotely over a purely digital data connection by attackers. [2,9] As another example, PUFs allow the short-term derivation of individual secret key material in devices, avoiding the long-term and attack-prone presence of secrets in digital memory. This usually complicates key extraction [2] and side channel attacks. [9] Finally, some special,