Results 71 to 80 of about 3,075 (191)
RRAM Variability Harvesting for CIM‐Integrated TRNG
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende +4 more
wiley +1 more source
Non‐Uniform Programmable Photonic Waveguide Meshes
Integrating defect cells into uniform hexagonal waveguide meshes overcomes the fundamental spectral and temporal limitations of programmable photonics. By leveraging the Vernier effect through non‐uniform coupled cavities, this architecture achieves a tenfold increase in free spectral range and ultra‐fast sampling times, paving the way for next ...
Cristina Catalá‐Lahoz, José Capmany
wiley +1 more source
Secure Communications using Nonlinear Silicon Photonic Keys
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities.
Bosworth, Bryan T. +5 more
core +1 more source
The Internet of Things (IoT) acts as an umbrella for the Internet-enabled devices for various applications, such as smart home, smart city, smart grid, and smart healthcare.
Soumya Banerjee +5 more
doaj +1 more source
Since the discovery of the physical random functions and their subsequent refinement into physical unclonable functions (PUF), a great effort has been made in developing and characterizing these objects attending to their physical properties as well as ...
Guillermo Diez-Senorans +3 more
doaj +1 more source
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun +3 more
wiley +1 more source
Modeling attacks on physical unclonable functions [PDF]
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs.
Ulrich, Ruhrmair +5 more
openaire +4 more sources
Organic Thin‐Film Transistors for Neuromorphic Computing
Organic thin‐film transistors (OTFTs) are reviewed for neuromorphic computing applications, highlighting their power‐efficient, and biological time‐scale operation. This article surveys OFET and OECT devices, compares them with memristors and CMOS, analyzes how fabrication parameters shape spike‐based metrics, proposes standardized characterization ...
Luke McCarthy +2 more
wiley +1 more source
The dependence between the write time and process variation of a memristor was investigated as a candidate physically unclonable function (PUF). Such write-time-based approach requires exact timing control of the programming pulse to achieve well ...
Ha-Phuong Nguyen +4 more
doaj +1 more source
This study presents a dynamic interaction between liquid resins and photopolymerized structures enabled by an in situ light‐writing setup. By controlling a three‐phase interface through localized photopolymerization, which provides physical confinement for the remaining uncured resin regions, the approach establishes a programmable pathway that ...
Kibeom Kim +3 more
wiley +1 more source

