2015
DOI: 10.1038/srep12785
|View full text |Cite
|
Sign up to set email alerts
|

Memristive crypto primitive for building highly secure physical unclonable functions

Abstract: Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
68
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 89 publications
(68 citation statements)
references
References 42 publications
0
68
0
Order By: Relevance
“…The security aspect has become more prominent with rapid developments in the field of information technology; thus, there is a need for hardware-based securityintegrated circuits. In contrast to security circuits based on CMOS logic which exploits the random nature of the semiconductor manufacturing process, security circuits based on RRAM are more robust to attacks of various types due to its completely random switching mechanisms [170,171]. It must be noted that for security applications, larger variation of RRAM device parameters such as random telegraph noise (RTN), resistance variations and probabilistic switching is desirable, which is quite different from memory applications that require a smaller degree of variation among numerous parameters.…”
Section: Security Applicationmentioning
confidence: 99%
“…The security aspect has become more prominent with rapid developments in the field of information technology; thus, there is a need for hardware-based securityintegrated circuits. In contrast to security circuits based on CMOS logic which exploits the random nature of the semiconductor manufacturing process, security circuits based on RRAM are more robust to attacks of various types due to its completely random switching mechanisms [170,171]. It must be noted that for security applications, larger variation of RRAM device parameters such as random telegraph noise (RTN), resistance variations and probabilistic switching is desirable, which is quite different from memory applications that require a smaller degree of variation among numerous parameters.…”
Section: Security Applicationmentioning
confidence: 99%
“…Each CRP is used only once. [114][115][116] However, many of these proposed works showed at least one weakness: A large number of devices and a strong correlation between the CRPs are required. Traditional CMOS-based strong PUFs are mostly implemented with a time-delay circuit such as an arbiter PUF or a ring oscillator PUF.…”
Section: Memristor-based Strong Pufsmentioning
confidence: 99%
“…However, despite the fact that such schemes are resilient to noise, they have been proven vulnerable to a plethora of machine learning and side channel attacks, which has been attributed to their low physical complexity [2]. Furthermore, implementations that are based on the inherent randomness of nanofabrication procedures, like memristors and surface plasmons [3], have shown great promise and potential, but the technology is still immature.…”
Section: Introductionmentioning
confidence: 99%