Results 61 to 70 of about 3,075 (191)

Barrel Shifter Physical Unclonable Function Based Encryption

open access: yes, 2017
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy   +2 more
core   +1 more source

Symmetric physically unclonable functions of the arbiter type

open access: yesInformatika
Objectives. The problem of constructing a new class of physically unclonable functions of the arbiter type (APUF) that combines the advantages of both classical and balanced APUF is solved.
V. N. Yarmolik, A. A. Ivaniuk
doaj   +1 more source

Terahertz-readable laser engraved marks as a novel solution for product traceability

open access: yesScientific Reports, 2023
Counterfeit products pose significant economic, security, and health risks. One approach to mitigate these risks involves establishing product provenance by tracing them back to their manufacturing origins.
Pouria Hoveida   +5 more
doaj   +1 more source

Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

open access: yesMathematics, 2022
Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example.
Masoumeh Safkhani   +6 more
doaj   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

Quantum cloning attacks against PUF-based quantum authentication systems

open access: yes, 2016
With the advent of Physical Unclonable Functions (PUFs), PUF-based quantum authentication systems (QAS) have been proposed for security purposes and recently proof-of-principle experiment has been demonstrated.
Gao, Ming, Li, Mo, Yao, Yao, Zhang, Jian
core   +1 more source

Efficient Error Correction Coding for Physically Unclonable Functions

open access: yesJournal of Low Power Electronics and Applications
Physically unclonable functions (PUFs) generate keys for cryptographic applications, eliminating the need for conventional key storage mechanisms. Since PUF responses are inherently noise-sensitive, their reliability can decrease under varying conditions.
Sreehari K. Narayanan   +2 more
doaj   +1 more source

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

Quantum Logic Locking for Security

open access: yesJ, 2023
Having access to a unique quantum circuit that one wants to protect against use by others is a very likely scenario in industrial computing. However, currently, users rely on classical computer security schemes, which have known shortcomings.
Rasit Onur Topaloglu
doaj   +1 more source

Home - About - Disclaimer - Privacy