in secret key generation and physical unclonable functions (PUF). In the problem
formulation, two legitimate parties wish to generate a common secret key from a noisy
observation of a common random source in the presence of a passive eavesdropper. We
consider three different families of codes for key reconciliation. All the selected codes show
promising performances in information transmission in the short blocklength regime. We …