Results 91 to 100 of about 522,468 (334)
A memristor fingerprinting and characterisation methodology for hardware security. [PDF]
Aitchison C +3 more
europepmc +1 more source
Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long +26 more
wiley +1 more source
A RRAM-Based True Random Number Generator with 2T1R Architecture for Hardware Security Applications. [PDF]
Peng B, Wu Q, Wang Z, Yang J.
europepmc +1 more source
Crypto Embedded System for Electronic Document [PDF]
In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA).
Ahmad, Illiasaak +2 more
core
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
openaire +1 more source
A Hardware-in-the-loop Experimental Platform for Power Grid Security [PDF]
James Kollmer +4 more
openalex +1 more source
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security [PDF]
Wenye Liu +8 more
openalex +1 more source
Néel Tensor Torque in Polycrystalline Antiferromagnets
This work introduces a Néel tensor torque based on a rank‐two symmetric tensor capturing spin correlations in a polycrystalline antiferromagnet. It shows the Néel tensor can be shaped and reshaped through the spin‐orbit torque (SOT) technique, enabling field‐free SOT switching with a specific polarity of the adjacent ferromagnet. This discovery opens a
Chao‐Yao Yang +4 more
wiley +1 more source
Introduction to Hardware Security [PDF]
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware.
openaire +2 more sources

