Recent advances of volatile memristors: Devices, mechanisms, and applications

R Wang, JQ Yang, JY Mao, ZP Wang… - Advanced Intelligent …, 2020 - Wiley Online Library
Due to the rapid development of artificial intelligence (AI) and internet of things (IoTs),
neuromorphic computing and hardware security are becoming more and more important …

Stochastic memory devices for security and computing

R Carboni, D Ielmini - Advanced Electronic Materials, 2019 - Wiley Online Library
With the widespread use of mobile computing and internet of things, secured communication
and chip authentication have become extremely important. Hardware‐based security …

Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors

A Oberoi, A Dodda, H Liu, M Terrones, S Das - ACS nano, 2021 - ACS Publications
The rapid proliferation of security compromised hardware in today's integrated circuit (IC)
supply chain poses a global threat to the reliability of communication, computing, and control …

Memristor-based PUF for lightweight cryptographic randomness

HM Ibrahim, H Abunahla, B Mohammad… - Scientific reports, 2022 - nature.com
Physical unclonable functions (PUF) are cryptographic primitives employed to generate true
and intrinsic randomness which is critical for cryptographic and secure applications. Thus …

Application of resistive random access memory in hardware security: A review

G Rajendran, W Banerjee… - Advanced Electronic …, 2021 - Wiley Online Library
Nowadays, advancements in the design of trusted system environments are relying on
security provided by hardware‐based primitives, while replacing resource‐hungry software …

A provable key destruction scheme based on memristive crossbar arrays

H Jiang, C Li, R Zhang, P Yan, P Lin, Y Li, JJ Yang… - Nature …, 2018 - nature.com
Digital keys are commonly used in today's hardware security systems. However, the
provable destruction of these keys after use remains a challenging problem. Most security …

Hardware implementation of a true random number generator integrating a hexagonal boron nitride memristor with a commercial microcontroller

S Pazos, W Zheng, T Zanotti, F Aguirre, T Becker… - Nanoscale, 2023 - pubs.rsc.org
The development of the internet-of-things requires cheap, light, small and reliable true
random number generator (TRNG) circuits to encrypt the data—generated by objects or …

True random number generator integration in a resistive RAM memory array using input current limitation

H Aziza, J Postel-Pellerin, H Bazzi… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
A novel True Random Number Generator circuit fabricated in a 130 nm HfO 2-based
resistive RAM process is presented. The generation of the random bit stream is based on a …

Accurate inference with inaccurate rram devices: A joint algorithm-design solution

G Charan, A Mohanty, X Du, G Krishnan… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Resistive random access memory (RRAM) is a promising technology for energy-efficient
neuromorphic accelerators. However, when a pretrained deep neural network (DNN) model …

Adiabatic/MTJ-based physically unclonable function for consumer electronics security

Z Kahleifeh, H Thapliyal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Consumer electronics require secure operation in the face of the many emerging threat
vectors. One hardware security primitive is the Physically Unclonable Function (PUF). PUFs …