Select the appropriate technology for hardware security (strong PUF, weak PUF, TRNG) for the following applications. Justify your choices.
(i) ID generation of a chip.
(ii) Authentication .
(iii) Licensing .
(iv) Key generation in an AES encryption/decryption system;