Results 81 to 90 of about 8,100 (211)

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, Volume 35, Issue 52, December 23, 2025.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

An Ultra‐Sub‐Wavelength Microwave Polarization Switching Antenna for Covert Communication Implemented With Directed Surface Acoustic Waves in an Artificial Multiferroic Magnonic Crystal

open access: yesAdvanced Materials Technologies, Volume 10, Issue 23, December 3, 2025.
A surface acoustic wave (SAW) launched in a two‐dimensional periodic array of magnetostrctive nanomagnets on a piezoelectric substrate excites spin waves in the nanomagnets which radiate electromagnetic waves in space. The polarization of the emitted beam in particular directions and at particular frequencies can be switched between horizontal and ...
Raisa Fabiha   +2 more
wiley   +1 more source

A Low-Cost Unified Experimental FPGA Board for Cryptography Applications [PDF]

open access: yes, 2016
This paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the PCB (Printed Circuit Board) for ...
Bartík, Matěj, Buček, Jiří
core  

Multi‐Level Hybrid Anti‐Counterfeit Labels via Solid‐State Dewetting Under Spatial Confinement

open access: yesAdvanced Materials Technologies, Volume 10, Issue 23, December 3, 2025.
This study presents a hybrid encoding approach combining deterministic patterns fabricated by photolithography and stochastic features formed by the solid‐state dewetting of silver films under strong confinement at the micrometer and nanometer length scales.
Farnaz Foadi   +5 more
wiley   +1 more source

The Implementation of the Physical Unclonable Function in a Field-Programmable Gate Array for Enhancing Hardware Security

open access: yesEngineering Proceedings
The integrated circuit (IC) industry has rapidly developed, with chip hardware security assuming a critical role in IC design. The physical unclonable function (PUF) exploits semiconductor process variation differences to generate unique responses ...
Kuang-Hao Lin, Wei-Hao Wang, I-Chen Wang
doaj   +1 more source

A Reliable Low-area Low-power PUF-based Key Generator [PDF]

open access: yes, 2016
This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell.
Bucci, Marco   +3 more
core  

Application of single-electron effects to fingerprints of chips using image recognition algorithms

open access: yes, 2019
Single-electron effects have been widely investigated as a typical physical phenomenon in nanoelectronics. The single-electron effect caused by trap sites has been observed in many devices. In general, traps are randomly distributed and not controllable;
Nishi, Y., Ono, K., Tanamoto, T.
core   +1 more source

Temporal Dynamics Makes Memristive Physical Unclonable Functions More Secure and Ultra‐Lightweight

open access: yesAdvanced Electronic Materials, Volume 11, Issue 20, December 3, 2025.
A temporal PUF (TPUF) is reported, using the randomness of temporal dynamics of memristors as an entropy source. By exploiting temporal complexity, significant reduction of hardware overhead is achieved in the TPUF, from otherwise at least hundreds‐of‐memristors‐scale crossbar arrays to only a pair of memristors.
Yunpeng Guo, Cheng Ma, Huanglong Li
wiley   +1 more source

MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT

open access: yes, 2023
Authenticating Internet of Things (IoT) devices is still a challenge, especially in deployments involving low-cost constrained nodes. The cited class of IoT devices hardly support dynamic re-keying solutions, hence being vulnerable to several attacks.
Ibrahim, Omar Adel   +2 more
openaire   +1 more source

Using physical unclonable functions for hardware authentication: a survey [PDF]

open access: yes, 2010
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special characteristics of simplicity and safety.
Acosta Jiménez, Antonio José   +3 more
core  

Home - About - Disclaimer - Privacy