Results 51 to 60 of about 137,811 (163)

Regulation of Synaptic Pumilio Function by an Aggregation-Prone Domain [PDF]

open access: yes, 2010
We identified Pumilio (Pum), a Drosophila translational repressor, in a computational search for metazoan proteins whose activities might be regulated by assembly into ordered aggregates.
Menon, Kaushiki P.   +3 more
core   +2 more sources

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

Assessment of Cryogenic Material Properties of R-PUF Used in the CCS of an LNG Carrier

open access: yes한국해양공학회지, 2022
Reinforced polyurethane foam (R-PUF), a material for liquefied natural gas cargo containment systems, is expected to have different mechanical properties depending on its stacking position of foaming as the glass fiber reinforcement of R-PUF sinks inside
Ha-Cheol Song
doaj   +1 more source

Arbiter PUF—A Review of Design, Composition, and Security Aspects

open access: yesIEEE Access, 2023
Hardware security modules play a crucial role in protecting and preserving technologically integrated systems that are used in daily life. They employ cryptographic protocols to secure a system against adversaries. Generally, cryptographic algorithms and
S. Hemavathy, V. S. Kanchana Bhaaskaran
doaj   +1 more source

A Reliable Low-area Low-power PUF-based Key Generator [PDF]

open access: yes, 2016
This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell.
Bucci, Marco   +3 more
core  

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Machine Learning of Physical Unclonable Functions using Helper Data

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such schemes are deemed to be secure even for PUFs with challenge-response behavior, as long as no responses and no reliability information about the PUF are ...
Emanuele Strieder   +2 more
doaj   +1 more source

PUF-AES-PUF: a novel PUF architecture against non-invasive attacks

open access: yes, 2018
In this letter, a physical unclonable function (PUF)-advanced encryption standard (AES)-PUF is proposed as a new PUF architecture by embedding an AES cryptographic circuit between two conventional PUF circuits to conceal their challenge-to-response pairs (CRPs) against machine learning attacks.
Yu, Weize, Chen, Jia
openaire   +2 more sources

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

Authentication of IC based on Electromagnetic Signature [PDF]

open access: yes, 2016
IC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which should be unique to one IC. The
Ahmed, Mosabbah Mushir   +4 more
core  

Home - About - Disclaimer - Privacy