2020
DOI: 10.1145/3412439
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography with Analog Scheme Using Memristors

Abstract: Networks of low-power Internet of Things do not have always access to enough computing power to support mainstream cryptographic schemes; such schemes also consume computing power that can be exposed to side channel attacks. This article describes a method, that we call “cryptography with analog scheme using memristors,” leveraging the physical properties of memristors, which are active elements suitable for the design of components such as artificial neurons. The proposed devices encrypt messages by segmentin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Another drawback of using keys for cryptography, however, is the large memory space allocated for key storage in devices. Most of the IoT devices do not possess ample memory space due to cost constraints and limited power supply [3,4,5]. This means that the problem of longer secret keys and strong cryptography systems can be hard to implement in IoT devices.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Another drawback of using keys for cryptography, however, is the large memory space allocated for key storage in devices. Most of the IoT devices do not possess ample memory space due to cost constraints and limited power supply [3,4,5]. This means that the problem of longer secret keys and strong cryptography systems can be hard to implement in IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…A keyless encryption scheme, which uses memristors technology, is developed by Bertrand Cambou et. al [3]. This protocol uses a memristor PUF (see table 1) to create ciphertext without generating a key.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations