Uddin et al., 2017 - Google Patents
Design considerations for memristive crossbar physical unclonable functionsUddin et al., 2017
View PDF- Document ID
- 10906769805557854841
- Author
- Uddin M
- Majumder M
- Beckmann K
- Manem H
- Alamgir Z
- Cady N
- Rose G
- Publication year
- Publication venue
- ACM Journal on Emerging Technologies in Computing Systems (JETC)
External Links
Snippet
Hardware security has emerged as a field concerned with issues such as integrated circuit (IC) counterfeiting, cloning, piracy, and reverse engineering. Physical unclonable functions (PUF) are hardware security primitives useful for mitigating such issues by providing …
- 238000000034 method 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Uddin et al. | Design considerations for memristive crossbar physical unclonable functions | |
Nili et al. | Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors | |
Rose et al. | Performance analysis of a memristive crossbar PUF design | |
Kumar et al. | On design of a highly secure PUF based on non-linear current mirrors | |
Uddin et al. | Techniques for improved reliability in memristive crossbar PUF circuits | |
Beckmann et al. | Performance enhancement of a time-delay PUF design by utilizing integrated nanoscale ReRAM devices | |
Zhang et al. | Feasibility study of emerging non-volatilememory based physical unclonable functions | |
Sahay et al. | Recent trends in hardware security exploiting hybrid CMOS-resistive memory circuits | |
Zhang et al. | Highly reliable spin-transfer torque magnetic RAM-based physical unclonable function with multi-response-bits per cell | |
Jeon et al. | A Physical Unclonable Function With Bit Error Rate< 2.3$\times $10− 8 Based on Contact Formation Probability Without Error Correction Code | |
Rajendran et al. | Improving tolerance to variations in memristor-based applications using parallel memristors | |
Mahmoodi et al. | Experimental demonstrations of security primitives with nonvolatile memories | |
Yeh et al. | Self-convergent trimming SRAM true random number generation with in-cell storage | |
Liu et al. | X-point PUF: Exploiting sneak paths for a strong physical unclonable function design | |
Li et al. | A 215-F² bistable physically unclonable function with an ACF of< 0.005 and a native bit instability of 2.05% in 65-nm CMOS process | |
Shifman et al. | An SRAM PUF with 2 independent bits/cell in 65nm | |
Mahmoodi et al. | A strong physically unclonable function With> 2⁸⁰ CRPs and< 1.4% BER using passive ReRAM technology | |
Lu et al. | A 6T SRAM based two-dimensional configurable challenge-response PUF for portable devices | |
Karam et al. | Security primitive design with nanoscale devices: A case study with resistive RAM | |
Schultz et al. | Vulnerabilities and reliability of ReRAM based PUFs and memory logic | |
Singh et al. | Hardware security primitives using passive rram crossbar array: Novel trng and puf designs | |
Vatajelu et al. | STT-MRAM-based strong PUF architecture | |
Wang et al. | A novel complementary architecture of one-time-programmable memory and its applications as physical unclonable function (PUF) and one-time password | |
BECKMANN et al. | Design Considerations for Memristive Crossbar Physical Unclonable Functions | |
Carboni et al. | Applications of resistive switching memory as hardware security primitive |