Results 61 to 70 of about 4,625 (193)

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

Ultra-Lightweight and Reconfigurable Tristate Inverter Based Physical Unclonable Function Design

open access: yesIEEE Access, 2018
A physical unclonable function (PUF) is a promising security primitive which utilizes the manufacturing process variations to generate a unique unclonable digital fingerprint for a chip.
Yijun Cui   +4 more
doaj   +1 more source

Non‐Uniform Programmable Photonic Waveguide Meshes

open access: yesLaser &Photonics Reviews, EarlyView.
Integrating defect cells into uniform hexagonal waveguide meshes overcomes the fundamental spectral and temporal limitations of programmable photonics. By leveraging the Vernier effect through non‐uniform coupled cavities, this architecture achieves a tenfold increase in free spectral range and ultra‐fast sampling times, paving the way for next ...
Cristina Catalá‐Lahoz, José Capmany
wiley   +1 more source

Physically unclonable function using CMOS breakdown position [PDF]

open access: yes2017 IEEE International Reliability Physics Symposium (IRPS), 2017
© 2017 IEEE. A novel physically unclonable function (PUF) utilizing the intrinsic randomness of oxide breakdown (BD) positions in CMOS transistors is presented. The advantages of this approach are studied and validated by measurements on test-chips fabricated in a commercial 40nm CMOS process. Experiments show that the required soft BDs can be reliably
Chuang, Kai-Hsin   +6 more
openaire   +1 more source

Logistic chaotic sequence generator based on physical unclonable function

open access: yesTongxin xuebao, 2019
Logistic nonlinear chaotic system has many good characters such as initial value sensitivity and topological mixing in the some parameter condition,which is used to create the random sequence signal generator.Because of the attributions of randomness and
Chunguang HUANG, Hai CHENG, Qun DING
doaj   +2 more sources

Phase Calibrated Ring Oscillator PUF Design and Application

open access: yesComputers, 2018
A Ring Oscillator Physical Unclonable Function (RO PUF) is an application-constrained hardware security primitive that can be used for authentication and key generation.
Wei Yan, John Chandy
doaj   +1 more source

Inkjet‐Printed Physical Unclonable Functions For Secure Authentication

open access: yesSmall, EarlyView.
Herein, we propose a low‐cost authentication system based on a scalable fabrication technology and user friendly recognition system. It involves inkjet printing as a manufacturing method and an optical recognition system based on contour features extraction.
Riccardo Sargeni   +5 more
wiley   +1 more source

Combined physical unclonable function circuit implementation for generation true random number sequences

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The possibility of using two physical unclonable functions (based on static random access memory and on the ring oscillators) to produce true random number sequences was investigated.
S. S. Zalivako, A. A. Ivaniuk
doaj  

High-dimensional anticounterfeiting nanodiamonds authenticated with deep metric learning

open access: yesNature Communications
Physical unclonable function labels have emerged as a promising candidate for achieving unbreakable anticounterfeiting. Despite their significant progress, two challenges for developing practical physical unclonable function systems remain, namely 1 ...
Lingzhi Wang   +6 more
doaj   +1 more source

An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays

open access: yesCryptography, 2018
Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loaded ...
Don Owen   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy