Pure digital scalable mixed entropy separation structure for physical unclonable function and true random number generator
Y Lu, X Wang, Y Wang, Y Zhang, L Yao… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
This study presents a pure digital scalable mixed entropy separation structure for the
physical unclonable function (PUF) and true random number generator (TRNG), which is …
physical unclonable function (PUF) and true random number generator (TRNG), which is …
A survey of security attacks on silicon based weak PUF architectures
C Yehoshuva, R Raja Adhithan… - Security in Computing …, 2021 - Springer
Abstract Physically Unclonable Functions (PUFs) are popular hardware-based security
primitives that can derive chip signatures from the inherent characteristics of ICs. Due to their …
primitives that can derive chip signatures from the inherent characteristics of ICs. Due to their …
Physical unclonable functions using ferroelectric tunnel junctions
We propose physical unclonable function (PUF) operations using ferroelectric tunnel
junctions (FTJs) and verify the effects of their dimension scaling on the PUF. First, device-to …
junctions (FTJs) and verify the effects of their dimension scaling on the PUF. First, device-to …
Evolutionary Consideration on User Authentication: Security, Privacy, and Safety
C Vorakulpipat, E Rattanalerdnusorn - IT Professional, 2021 - ieeexplore.ieee.org
User authentication needs not only to negotiate with security, privacy, and legal issues
through functionality and usability, but also to address safety issues caused by sudden and …
through functionality and usability, but also to address safety issues caused by sudden and …
A differential OTP memory based highly unique and reliable PUF at 180 nm technology node
A random binary code-based unique chip identity is essential for the security of Internet-of-
Things devices. Physically Unclonable Function (PUF) exploits intrinsic physical …
Things devices. Physically Unclonable Function (PUF) exploits intrinsic physical …
PUF-Based Lightweight Authentication Protocol for IoT Devices Check for updates
A Shah, H Pandya, M Soni, A Karimov… - … : Proceedings of IC …, 2023 - books.google.com
Abstract The Internet of Things (IoTs) carries the secure transmission and storage of a large
amount of sensitive information. This paper uses the anti-tampering and anti-cloning …
amount of sensitive information. This paper uses the anti-tampering and anti-cloning …
Emerging Memory Technologies for Data Storage and Brain-Inspired Computation: A Global View with Indian Research Insights with a Focus on Resistive Memories
S Lashkare, W Uddin, K Priyadarshi… - Proceedings of the …, 2023 - Springer
This article is an overview of emerging memory materials and their role in advanced brain-
inspired computing technologies. It starts with the progress of memory technologies over the …
inspired computing technologies. It starts with the progress of memory technologies over the …
PUF-Based Lightweight Authentication Protocol for IoT Devices
A Shah, H Pandya, M Soni, A Karimov… - … on Intelligent Computing …, 2023 - Springer
Abstract The Internet of Things (IoTs) carries the secure transmission and storage of a large
amount of sensitive information. This paper uses the anti-tampering and anti-cloning …
amount of sensitive information. This paper uses the anti-tampering and anti-cloning …
An in-pixel gain amplifier based event-driven physical unclonable function for CMOS dynamic vision sensors
In this paper, a novel in-pixel event-driven physical unclonable function (PUF) is presented
for the rapidly developed CMOS dynamic vision sensor (DVS). Different from traditional …
for the rapidly developed CMOS dynamic vision sensor (DVS). Different from traditional …
A 16-kb Antifuse One-Time-Programmable Memory in 5-nm High-K Metal-Gate FinFET CMOS Featuring Bootstrap High-Voltage Scheme, Read Endpoint Detection …
SYS Chou, S Chen, JH Chang… - IEEE Solid-State …, 2021 - ieeexplore.ieee.org
This letter presents a 16-kb antifuse macro in a 5-nm high-K, metal-gate FinFET CMOS for
the first time. Bootstrap high-voltage scheme (BHVS), read endpoint detection (REPD), and …
the first time. Bootstrap high-voltage scheme (BHVS), read endpoint detection (REPD), and …