With rapid advancements in electronic gadgets, the security and privacy aspects of these devices are significant. For the design of secure systems, physical unclonable function (PUF) and true random number generator (TRNG) are critical hardware security primitives for security applications. This paper proposes novel implementations of PUF and TRNGs on the RRAM crossbar structure. Firstly, two techniques to implement the TRNG in the RRAM crossbar are presented based on write-back and 50% switching probability pulse. The randomness of the proposed TRNGs is evaluated using the NIST test suite. Next, an architecture to implement the PUF in the RRAM crossbar is presented. The initial entropy source for the PUF is used from TRNGs, and challenge-r...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
This article belongs to the Special Issue Circuits and Systems of Security Applications.This paper p...
When moving into the upcoming Internet-of-Things (IoT) era, hardware security has become a very impo...
True Random Number Generators (TRNGs) and Physical Unclonable Functions (PUFs) are two important typ...
International audienceThe rapid development of low power, high density, high performance SoCs has pu...
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
International audienceRecently, memristors received considerable attention in various applications. ...
In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (...
With CMOS technology scaling reaching its limitations rigorous research of alternate and competent t...
This work presents a RRAM-bias current starved ring oscillator (CSRO) as TRNG, where the cycle-to-cy...
With the widespread use of mobile computing and internet of things, secured communication and chip a...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Resistive random access memories (RRAMs)have arisen as a competitive candidate for non-volatile memo...
As embedded electronics continue to be integrated into our daily lives at such a pace that there are...
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physi...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
This article belongs to the Special Issue Circuits and Systems of Security Applications.This paper p...
When moving into the upcoming Internet-of-Things (IoT) era, hardware security has become a very impo...
True Random Number Generators (TRNGs) and Physical Unclonable Functions (PUFs) are two important typ...
International audienceThe rapid development of low power, high density, high performance SoCs has pu...
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
International audienceRecently, memristors received considerable attention in various applications. ...
In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (...
With CMOS technology scaling reaching its limitations rigorous research of alternate and competent t...
This work presents a RRAM-bias current starved ring oscillator (CSRO) as TRNG, where the cycle-to-cy...
With the widespread use of mobile computing and internet of things, secured communication and chip a...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Resistive random access memories (RRAMs)have arisen as a competitive candidate for non-volatile memo...
As embedded electronics continue to be integrated into our daily lives at such a pace that there are...
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physi...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
This article belongs to the Special Issue Circuits and Systems of Security Applications.This paper p...
When moving into the upcoming Internet-of-Things (IoT) era, hardware security has become a very impo...