Results 91 to 100 of about 8,100 (211)

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, Volume 11, Issue 19, November 18, 2025.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

Quantum Dots and Perovskites‐Based Physically Unclonable Functions for Binary and Ternary Keys via Optical‐to‐Electrical Conversion

open access: yesAdvanced Functional Materials, Volume 35, Issue 42, October 15, 2025.
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo   +6 more
wiley   +1 more source

Aging resilient ring oscillators for reliable Physically Unclonable Functions (PUFs)

open access: yesMicroelectronics Reliability
Physically Unclonable Functions (PUFs) are a promising low-cost solution for authentication and key generation in cryptosystems. However, it has been shown in the literature that, due to aging mechanisms such as Bias Temperature Instability (BTI), PUFs may no longer be able to generate correct outputs after a certain lifetime, thus becoming unreliable.
M. Omana, M. Grossi, D. Rossi, C. Metra
openaire   +3 more sources

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon [PDF]

open access: yes, 2012
Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security features of PUFs are still under investigation: Evaluation results in the literature are difficult to compare due to varying test conditions ...
Katzenbeisser, Stefan   +5 more
openaire   +1 more source

Quantum Dot‐Polymer Architectures by Two‐Photon Polymerization: From 4D Microfabrication to Quantum Light Sources

open access: yesAdvanced Optical Materials, Volume 13, Issue 29, October 13, 2025.
2PP of photopolymers containing QDs is an advanced fabrication strategy for creating innovative devices at various scales. The development of reliable protocols for the homogeneous integration of QDs into photopolymers, along with precise control over the optical phenomena occurring during 2PP, enables the realization of structures ranging from 4D ...
Tiziana Ritacco   +4 more
wiley   +1 more source

A robust deep learning attack immune MRAM-based physical unclonable function

open access: yesScientific Reports
The ubiquitous presence of electronic devices demands robust hardware security mechanisms to safeguard sensitive information from threats. This paper presents a physical unclonable function (PUF) circuit based on magnetoresistive random access memory ...
Mohammad Javad Adel   +4 more
semanticscholar   +1 more source

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, and which possesses a rigorous security argument, has been a fundamental problem in PUF research since its very beginnings in 2002.
Phuong Ha Nguyen   +5 more
doaj   +1 more source

FLEX PUF: A Flexible Physical Unclonable Function Design Using Configurable Templates

open access: yes, 2023
Abstract Field Programmable Gate Array (FPGA) has been seen as the intersection between cost and design time when compared to ASIC and DSP. Many of the security risks present in the supply chain apply to FPGA devices, and as such, there exists a need for FPGA-based security measures.
Christopher Vega   +3 more
openaire   +1 more source

IMPLEMENTATION OF CONFIGURABLE RING OSCILLATOR PUF WITH SYMMETRICAL PATHS ON FPGA

open access: yesБезопасность информационных технологий
This paper proposes a novel Physical Unclonable Function (PUF) scheme based on a configurable ring oscillator. The circuit utilizes the measurement of signal propagation delay differences along symmetric paths constructed using the internal resources of ...
Alexander A. Ivaniuk, Ksena I. Trubach
doaj   +1 more source

Home - About - Disclaimer - Privacy