Proceedings of the 26th Edition on Great Lakes Symposium on VLSI 2016
DOI: 10.1145/2902961.2903043
|View full text |Cite
|
Sign up to set email alerts
|

The Applications of NVM Technology in Hardware Security

Abstract: The emerging nonvolatile memory (NVM) technologies have demonstrated great potentials in revolutionizing modern memory hierarchy because of their many promising properties: nanosecond read/write time, small cell area, non-volatility, and easy CMOS integration. It is also found that NVM devices can be leveraged to realize some hardware security solutions efficiently, such as physical unclonable function (PUF) and random number generator (RNG). In this paper, we summarize two of our works about using NVM devices… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Memristors are differed from each other and classified according to the technology of creation, materials and related features. In this paper we propose a design of TRNG circuit that is based on Phase-Change Memory device (Ge 2 Sb 2 T e 2 ), which is known as GST memristor [4], [5], [6], [7]. For the present time there is no existing GST memristor model, that is why its characteristical equations and parameters should be investigated in order to create its emulator circuit.…”
Section: Introductionmentioning
confidence: 99%
“…Memristors are differed from each other and classified according to the technology of creation, materials and related features. In this paper we propose a design of TRNG circuit that is based on Phase-Change Memory device (Ge 2 Sb 2 T e 2 ), which is known as GST memristor [4], [5], [6], [7]. For the present time there is no existing GST memristor model, that is why its characteristical equations and parameters should be investigated in order to create its emulator circuit.…”
Section: Introductionmentioning
confidence: 99%
“…The Gaussian distribution observed in this paper was also mentioned in the recent experiment of the HfO 2 -based memristor array [ 29 ]. The Gaussian distribution function can also be found in the threshold voltage of flash memory cells programmed by the program-verify scheme such as ISPP [ 44 , 45 ].…”
Section: Discussionmentioning
confidence: 99%
“…The demand for logic nonvolatile memories (NVMs), which are fully compatible with advanced CMOS logic processes, is growing fast in the Internet of Things (IOT) era. [1][2][3][4][5][6][7][8][9][10][11] Full compatibility with standard processes of logic NVMs can greatly reduce developmental costs and can be adapted to different generations of technology nodes. Compact cell arrays, high programming and accessing speed, and low power consumption are also desirable features.…”
Section: Introductionmentioning
confidence: 99%