2021
DOI: 10.1007/s41635-021-00120-6
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 46 publications
0
1
0
Order By: Relevance
“…A memory architecture using multi-bit entropy was used for hardware security applications [32]. The combinational TRNG and PUF techniques were designed for resistive random-access memory and FPGA applications [33,34]. The PUF was used for providing a cryptographic key to optimize the elements in the configurable logic block of the FPGA board [35].…”
Section: Introductionmentioning
confidence: 99%
“…A memory architecture using multi-bit entropy was used for hardware security applications [32]. The combinational TRNG and PUF techniques were designed for resistive random-access memory and FPGA applications [33,34]. The PUF was used for providing a cryptographic key to optimize the elements in the configurable logic block of the FPGA board [35].…”
Section: Introductionmentioning
confidence: 99%