This
protocol is considered to be secure because it is difficult to
replicate a PUF circuit and model the PUF circuit successfully.
However, there are still security problems in this approach.
For example, if the reader uses the same challenge again, an
adversary can trace the tag. This problem can be described as
replay attacks. To overcome this issue the authors propose
cryptographic schemes where challenges and responses are
encrypted.