Results 51 to 60 of about 4,625 (193)
Secure Communications using Nonlinear Silicon Photonic Keys
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities.
Bosworth, Bryan T. +5 more
core +1 more source
Model‐Inversion‐Resistant Physical Unclonable Neural Network Using Vertical NAND Flash Memory
Schematic and key features of the proposed forward‐forward physical unclonable neural network (FF‐PUNN), incorporating a concealable physical unclonable function (PUF) layer and forward‐forward (FF) learning. ABSTRACT The growing use of neural networks in privacy‐sensitive applications necessitates architectures that inherently protect both data and ...
Sung‐Ho Park +8 more
wiley +1 more source
Design of Cell Reselection Security Protocol Based on Physical Unclonable Function [PDF]
Cell reselection algorithm is the key technology for the terminal to continue to obtain good service.It is very important to design a protocol to enhance the security of the cell reselection algorithm,so that the user’s signal quality and communication ...
YANG Jianxi,ZHANG Yue,CHI Yaping,XU Ping
doaj +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia +13 more
wiley +1 more source
Modeling attacks on physical unclonable functions [PDF]
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs.
Ulrich, Ruhrmair +5 more
openaire +4 more sources
Chemical unclonable functions based on operable random DNA pools
Physical unclonable functions (PUFs) based on unique tokens generated by random manufacturing processes have been proposed as an alternative to mathematical one-way algorithms.
Anne M. Luescher +4 more
doaj +1 more source
Leveraging Distributions in Physical Unclonable Functions
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by
Wenjie Che +3 more
doaj +1 more source
Organic Thin‐Film Transistors for Neuromorphic Computing
Organic thin‐film transistors (OTFTs) are reviewed for neuromorphic computing applications, highlighting their power‐efficient, and biological time‐scale operation. This article surveys OFET and OECT devices, compares them with memristors and CMOS, analyzes how fabrication parameters shape spike‐based metrics, proposes standardized characterization ...
Luke McCarthy +2 more
wiley +1 more source
Controllable Identifier Measurements for Private Authentication with Secret Keys
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence.
Caire, Giuseppe +3 more
core +1 more source

