Zhao et al., 2020 - Google Patents
A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noiseZhao et al., 2020
- Document ID
- 18336556472043639444
- Author
- Zhao Q
- Zheng W
- Zhao X
- Cao Y
- Zhang F
- Law M
- Publication year
- Publication venue
- IEEE Transactions on Circuits and Systems I: Regular Papers
External Links
Snippet
In this paper, we present a fully reconfigurable resistive random access memory (RRAM) physical unclonable function (PUF) based on the truly random dynamic entropy of the ubiquitous jitter noise, which is intrinsically different from most previously demonstrated PUF …
- 238000000034 method 0 abstract description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H03—BASIC ELECTRONIC CIRCUITRY
- H03K—PULSE TECHNIQUE
- H03K3/00—Circuits for generating electric pulses; Monostable, bistable or multistable circuits
- H03K3/02—Generators characterised by the type of circuit or by the means used for producing pulses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhao et al. | A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise | |
Alioto | Trends in hardware security: From basics to ASICs | |
Cao et al. | A low power diode-clamped inverter-based strong physical unclonable function for robust and lightweight authentication | |
Hemavathy et al. | Arbiter PUF—A review of design, composition, and security aspects | |
Li et al. | Ultra-compact and robust physically unclonable function based on voltage-compensated proportional-to-absolute-temperature voltage generators | |
Baturone et al. | Improved generation of identifiers, secret keys, and random numbers from SRAMs | |
CN110366838B (en) | Random number generator including physically unclonable circuits | |
Shah et al. | Introducing recurrence in strong PUFs for enhanced machine learning attack resistance | |
Zhao et al. | An ultracompact switching-voltage-based fully reconfigurable RRAM PUF with low native instability | |
Baek et al. | A reconfigurable SRAM based CMOS PUF with challenge to response pairs | |
Liu et al. | A weak PUF-assisted strong PUF with inherent immunity to modeling attacks and ultra-low BER | |
Liang et al. | A wide-range variation-resilient physically unclonable function in 28 nm | |
Zhao et al. | A 1036-F 2/bit high reliability temperature compensated cross-coupled comparator-based PUF | |
Cao et al. | An energy-efficient current-starved inverter based strong physical unclonable function with enhanced temperature stability | |
Park et al. | A BER-suppressed PUF with an amplification of process mismatch effect in an oscillator collapse topology | |
Rahman et al. | Reliability vs. security: Challenges and opportunities for developing reliable and secure integrated circuits | |
Bai et al. | A novel thyristor-based silicon physical unclonable function | |
Mathew et al. | A novel memristor based physically unclonable function | |
Cao et al. | A new reconfigurable true random number generator and physical unclonable function unified chip with on-chip auto-calibration | |
Kurra et al. | A secure arbiter physical unclonable functions (PUFs) for device authentication and identification | |
Wei et al. | A perspective of using frequency-mixing as entropy in random number generation for portable hardware cybersecurity IP | |
Mispan et al. | Physical unclonable function: A hardware fingerprinting solution | |
Ganta et al. | Easy-to-build arbiter physical unclonable function with enhanced challenge/response set | |
Halak | Physically unclonable functions: Design principles and evaluation metrics | |
Carboni et al. | Applications of resistive switching memory as hardware security primitive |