2022
DOI: 10.1007/978-3-031-10467-1_54
|View full text |Cite
|
Sign up to set email alerts
|

Bit Error Rate Analysis of Pre-formed ReRAM-based PUF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Reliability is gained by choosing cells for comparison that are previously known to have responses either reliably below or above the mean response. [21] While techniques such as noise injection are used in systems with powerful computing clusters, many IOT devices communicate with ordinary desktop computers or wireless routers. For these less powerful computers key fragmentation is used to simplify the RBC computation for the IOT server.…”
Section: Error Sources and Correction With Pufsmentioning
confidence: 99%
“…Reliability is gained by choosing cells for comparison that are previously known to have responses either reliably below or above the mean response. [21] While techniques such as noise injection are used in systems with powerful computing clusters, many IOT devices communicate with ordinary desktop computers or wireless routers. For these less powerful computers key fragmentation is used to simplify the RBC computation for the IOT server.…”
Section: Error Sources and Correction With Pufsmentioning
confidence: 99%
“…By performing BER analysis we understand the reliability of the keys generated. 25 During key generation, lower BER is preferred because it enables the use of light weight ECC and yields low energy; 31 however, in this case, we wanted to increase BER significantly to be able to define the threshold error that can be tolerated during authentication. In order to calculate the BER, we calculate the mean of the errors and divide it by the length of the key generated.…”
Section: Bit Error Ratementioning
confidence: 99%
“…Figure 5. Ternary addressable public key infrastructure (TAPKI) protocol used to generate cryptographic keys using SRAM PUFs16,25, 29,30 …”
mentioning
confidence: 99%