Recent advances of volatile memristors: Devices, mechanisms, and applications
R Wang, JQ Yang, JY Mao, ZP Wang… - Advanced Intelligent …, 2020 - Wiley Online Library
Due to the rapid development of artificial intelligence (AI) and internet of things (IoTs),
neuromorphic computing and hardware security are becoming more and more important …
neuromorphic computing and hardware security are becoming more and more important …
Stochastic memory devices for security and computing
With the widespread use of mobile computing and internet of things, secured communication
and chip authentication have become extremely important. Hardware‐based security …
and chip authentication have become extremely important. Hardware‐based security …
Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors
The rapid proliferation of security compromised hardware in today's integrated circuit (IC)
supply chain poses a global threat to the reliability of communication, computing, and control …
supply chain poses a global threat to the reliability of communication, computing, and control …
Memristor-based PUF for lightweight cryptographic randomness
HM Ibrahim, H Abunahla, B Mohammad… - Scientific reports, 2022 - nature.com
Physical unclonable functions (PUF) are cryptographic primitives employed to generate true
and intrinsic randomness which is critical for cryptographic and secure applications. Thus …
and intrinsic randomness which is critical for cryptographic and secure applications. Thus …
Application of resistive random access memory in hardware security: A review
G Rajendran, W Banerjee… - Advanced Electronic …, 2021 - Wiley Online Library
Nowadays, advancements in the design of trusted system environments are relying on
security provided by hardware‐based primitives, while replacing resource‐hungry software …
security provided by hardware‐based primitives, while replacing resource‐hungry software …
A provable key destruction scheme based on memristive crossbar arrays
Digital keys are commonly used in today's hardware security systems. However, the
provable destruction of these keys after use remains a challenging problem. Most security …
provable destruction of these keys after use remains a challenging problem. Most security …
Hardware implementation of a true random number generator integrating a hexagonal boron nitride memristor with a commercial microcontroller
The development of the internet-of-things requires cheap, light, small and reliable true
random number generator (TRNG) circuits to encrypt the data—generated by objects or …
random number generator (TRNG) circuits to encrypt the data—generated by objects or …
True random number generator integration in a resistive RAM memory array using input current limitation
A novel True Random Number Generator circuit fabricated in a 130 nm HfO 2-based
resistive RAM process is presented. The generation of the random bit stream is based on a …
resistive RAM process is presented. The generation of the random bit stream is based on a …
Accurate inference with inaccurate rram devices: A joint algorithm-design solution
Resistive random access memory (RRAM) is a promising technology for energy-efficient
neuromorphic accelerators. However, when a pretrained deep neural network (DNN) model …
neuromorphic accelerators. However, when a pretrained deep neural network (DNN) model …
Adiabatic/MTJ-based physically unclonable function for consumer electronics security
Z Kahleifeh, H Thapliyal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Consumer electronics require secure operation in the face of the many emerging threat
vectors. One hardware security primitive is the Physically Unclonable Function (PUF). PUFs …
vectors. One hardware security primitive is the Physically Unclonable Function (PUF). PUFs …