Results 71 to 80 of about 155,386 (234)

Assessment of Cryogenic Material Properties of R-PUF Used in the CCS of an LNG Carrier

open access: yes한국해양공학회지, 2022
Reinforced polyurethane foam (R-PUF), a material for liquefied natural gas cargo containment systems, is expected to have different mechanical properties depending on its stacking position of foaming as the glass fiber reinforcement of R-PUF sinks inside
Ha-Cheol Song
doaj   +1 more source

A Reliable Low-area Low-power PUF-based Key Generator [PDF]

open access: yes, 2016
This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell.
Bucci, Marco   +3 more
core  

Néel Tensor Torque in Polycrystalline Antiferromagnets

open access: yesAdvanced Materials, EarlyView.
This work introduces a Néel tensor torque based on a rank‐two symmetric tensor capturing spin correlations in a polycrystalline antiferromagnet. It shows the Néel tensor can be shaped and reshaped through the spin‐orbit torque (SOT) technique, enabling field‐free SOT switching with a specific polarity of the adjacent ferromagnet. This discovery opens a
Chao‐Yao Yang   +4 more
wiley   +1 more source

Authentication of IC based on Electromagnetic Signature [PDF]

open access: yes, 2016
IC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which should be unique to one IC. The
Ahmed, Mosabbah Mushir   +4 more
core  

A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication [PDF]

open access: yes, 2016
We present a lightweight PUF-based authentication approach that is practical in settings where a server authenticates a device, and for use cases where the number of authentications is limited over a device's lifetime.
Delvaux, Jeroen   +5 more
core   +1 more source

Recent Advances on Thermochromic Inks for Security Applications

open access: yesAdvanced Materials Technologies, EarlyView.
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira   +5 more
wiley   +1 more source

An Efficient Design of Anderson PUF by Utilization of the Xilinx Primitives in the SLICEM

open access: yesIEEE Access, 2021
Physical unclonable functions (PUFs) are known as one of the most recent promising technologies for cryptographic key generation. A PUF circuit is designed in such a way to produce random digits based on true-random and uncontrollable variations during ...
Armin Lotfy   +3 more
doaj   +1 more source

A comparison of PUF cores suitable for FPGA devices [PDF]

open access: yes, 2016
A PUF extracts a unique identifier per die using physical random variation caused by variability of the manufacturing process. PUFs can be used for hardware authentication, but also as generators of confidential keys.
Bossuet, Lilian   +2 more
core  

PUF-AES-PUF: a novel PUF architecture against non-invasive attacks

open access: yes, 2018
In this letter, a physical unclonable function (PUF)-advanced encryption standard (AES)-PUF is proposed as a new PUF architecture by embedding an AES cryptographic circuit between two conventional PUF circuits to conceal their challenge-to-response pairs (CRPs) against machine learning attacks.
Yu, Weize, Chen, Jia
openaire   +2 more sources

RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning [PDF]

open access: yesIEEE Internet of Things Journal, 2018
Traditional authentication in radio-frequency (RF) systems enable secure data communication within a network through techniques such as digital signatures and hash-based message authentication codes (HMAC), which suffer from key-recovery attacks.
B. Chatterjee   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy