Results 41 to 50 of about 4,625 (193)

Emerging physical unclonable functions with nanotechnology [PDF]

open access: yes, 2016
Physical unclonable functions (PUFs) are increasingly used for authentication and identification applications as well as the cryptographic key generation.
Abbott, D   +4 more
core   +1 more source

Image encryption and decryption utilizing physical unclonable function-based key generator by Ta/WTiOx/Pt memristor array [PDF]

open access: yesAIP Advances
In this work, an encryption and decryption system utilizing physical unclonable function (PUF) characteristics of the Ta/WTiOx/Pt memristor array as hardware-level security primitive is demonstrated.
Yaoyao Jin   +10 more
doaj   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

An Optical-Fiber-Based Key for Remote Authentication of Users and Optical Fiber Lines

open access: yesSensors, 2023
We have shown the opportunity to use the unique inhomogeneities of the internal structure of an optical fiber waveguide for remote authentication of users or an optic fiber line.
Alexander Smirnov   +4 more
doaj   +1 more source

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

Printed smart devices for anti-counterfeiting allowing precise identification with household equipment

open access: yesNature Communications
Counterfeiting has become a serious global problem, causing worldwide losses and disrupting the normal order of society. Physical unclonable functions are promising hardware-based cryptographic primitives, especially those generated by chemical processes
Junfang Zhang   +6 more
doaj   +1 more source

Key Generation Scheme for RFID Tag Based on SRAM PUF Stability Processing [PDF]

open access: yesJisuanji gongcheng, 2020
Physical Unclonable Function(PUF) improves the security of the RFID communication system because of its unpredictable and unclonable characteristics.However,the stability of PUF response brings great challenges to tags with limited resources and ...
PAN Shesu, ZHANG Jijun, ZHANG Zhaofeng
doaj   +1 more source

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions

open access: yes, 2014
We introduce the class of multiply constant-weight codes to improve the reliability of certain physically unclonable function (PUF) response. We extend classical coding methods to construct multiply constant-weight codes from known $q$-ary and constant ...
Chee, Yeow Meng   +7 more
core   +3 more sources

Low Power Optoelectronic Neuromorphic Memristor for In‐Sensor Computing and Multilevel Hardware Security Communications

open access: yesAdvanced Science, EarlyView.
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy