Nothing Special   »   [go: up one dir, main page]

Uddin et al., 2017 - Google Patents

Design considerations for memristive crossbar physical unclonable functions

Uddin et al., 2017

View PDF
Document ID
10906769805557854841
Author
Uddin M
Majumder M
Beckmann K
Manem H
Alamgir Z
Cady N
Rose G
Publication year
Publication venue
ACM Journal on Emerging Technologies in Computing Systems (JETC)

External Links

Snippet

Hardware security has emerged as a field concerned with issues such as integrated circuit (IC) counterfeiting, cloning, piracy, and reverse engineering. Physical unclonable functions (PUF) are hardware security primitives useful for mitigating such issues by providing …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/0001Technical content checked by a classifier
    • H01L2924/0002Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Similar Documents

Publication Publication Date Title
Uddin et al. Design considerations for memristive crossbar physical unclonable functions
Nili et al. Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors
Rose et al. Performance analysis of a memristive crossbar PUF design
Kumar et al. On design of a highly secure PUF based on non-linear current mirrors
Uddin et al. Techniques for improved reliability in memristive crossbar PUF circuits
Beckmann et al. Performance enhancement of a time-delay PUF design by utilizing integrated nanoscale ReRAM devices
Zhang et al. Feasibility study of emerging non-volatilememory based physical unclonable functions
Sahay et al. Recent trends in hardware security exploiting hybrid CMOS-resistive memory circuits
Zhang et al. Highly reliable spin-transfer torque magnetic RAM-based physical unclonable function with multi-response-bits per cell
Jeon et al. A Physical Unclonable Function With Bit Error Rate< 2.3$\times $10− 8 Based on Contact Formation Probability Without Error Correction Code
Rajendran et al. Improving tolerance to variations in memristor-based applications using parallel memristors
Mahmoodi et al. Experimental demonstrations of security primitives with nonvolatile memories
Yeh et al. Self-convergent trimming SRAM true random number generation with in-cell storage
Liu et al. X-point PUF: Exploiting sneak paths for a strong physical unclonable function design
Li et al. A 215-F² bistable physically unclonable function with an ACF of< 0.005 and a native bit instability of 2.05% in 65-nm CMOS process
Shifman et al. An SRAM PUF with 2 independent bits/cell in 65nm
Mahmoodi et al. A strong physically unclonable function With> 2⁸⁰ CRPs and< 1.4% BER using passive ReRAM technology
Lu et al. A 6T SRAM based two-dimensional configurable challenge-response PUF for portable devices
Karam et al. Security primitive design with nanoscale devices: A case study with resistive RAM
Schultz et al. Vulnerabilities and reliability of ReRAM based PUFs and memory logic
Singh et al. Hardware security primitives using passive rram crossbar array: Novel trng and puf designs
Vatajelu et al. STT-MRAM-based strong PUF architecture
Wang et al. A novel complementary architecture of one-time-programmable memory and its applications as physical unclonable function (PUF) and one-time password
BECKMANN et al. Design Considerations for Memristive Crossbar Physical Unclonable Functions
Carboni et al. Applications of resistive switching memory as hardware security primitive