International audienceThe rapid development of low power, high density, high performance SoCs has pushed the CMOS devices to their limits and opened the field to the development of emerging technologies. The STT-MRAM and RRAM have emerged as promising choices for embedded memories due to their reduced read/write latency and high CMOS integration capability. Their inner properties make them ideal for implementation of memory blocks (mach and main memory) and, in addition, they are suitable for the implementation of basic security primitives such Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs). PUFs are emerging primitives used to implement low-cost device authentication and secure secret key generation. On th...
University of Minnesota Ph.D. dissertation. 2017. Major: Electrical Engineering. Advisor: Keshab Par...
We describe the notion of a Physical Random Function (PUF). We argue that a complex integrated circu...
According to the renowned Kerckhoffs' principle, a cryptographic system should be secure even if the...
With the widespread use of mobile computing and internet of things, secured communication and chip a...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
When moving into the upcoming Internet-of-Things (IoT) era, hardware security has become a very impo...
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
With CMOS technology scaling reaching its limitations rigorous research of alternate and competent t...
With rapid advancements in electronic gadgets, the security and privacy aspects of these devices are...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Random number generators (RNG) play an important role in many sensor network systems and application...
Resistive random access memories (RRAMs)have arisen as a competitive candidate for non-volatile memo...
An emerging technology known as Physical unclonable function (PUF) can provide a hardware root-of-tr...
In this work, we look into several aspects of hardware security. The major part of this thesis is de...
The intrinsic variability of switching behavior in memristors has been a major obstacle to their ado...
University of Minnesota Ph.D. dissertation. 2017. Major: Electrical Engineering. Advisor: Keshab Par...
We describe the notion of a Physical Random Function (PUF). We argue that a complex integrated circu...
According to the renowned Kerckhoffs' principle, a cryptographic system should be secure even if the...
With the widespread use of mobile computing and internet of things, secured communication and chip a...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
When moving into the upcoming Internet-of-Things (IoT) era, hardware security has become a very impo...
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
With CMOS technology scaling reaching its limitations rigorous research of alternate and competent t...
With rapid advancements in electronic gadgets, the security and privacy aspects of these devices are...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Random number generators (RNG) play an important role in many sensor network systems and application...
Resistive random access memories (RRAMs)have arisen as a competitive candidate for non-volatile memo...
An emerging technology known as Physical unclonable function (PUF) can provide a hardware root-of-tr...
In this work, we look into several aspects of hardware security. The major part of this thesis is de...
The intrinsic variability of switching behavior in memristors has been a major obstacle to their ado...
University of Minnesota Ph.D. dissertation. 2017. Major: Electrical Engineering. Advisor: Keshab Par...
We describe the notion of a Physical Random Function (PUF). We argue that a complex integrated circu...
According to the renowned Kerckhoffs' principle, a cryptographic system should be secure even if the...