2020 IEEE International Symposium on Circuits and Systems (ISCAS) 2020
DOI: 10.1109/iscas45731.2020.9180411
|View full text |Cite
|
Sign up to set email alerts
|

A Stable Physically Unclonable Function Based on a Standard CMOS NVR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…In another case, the NVRAM mode presents an unstable state in the bit cell when the I a and I b are similar. The unstable bit can be solved in the memory controller or by using a stabilization scheme [41]. However, the unstable bit can be exploited to extract random numbers when the I a and I b are similar (U nstable mode).…”
Section: Nvram-trng Unified a Nvram-trng Physical Phenomenamentioning
confidence: 99%
See 2 more Smart Citations
“…In another case, the NVRAM mode presents an unstable state in the bit cell when the I a and I b are similar. The unstable bit can be solved in the memory controller or by using a stabilization scheme [41]. However, the unstable bit can be exploited to extract random numbers when the I a and I b are similar (U nstable mode).…”
Section: Nvram-trng Unified a Nvram-trng Physical Phenomenamentioning
confidence: 99%
“…The differential NVRAM bit cell presents an initial value generated for the changes introduced in the fabrication process. The initial charges are used for Physical Unclonable Functions (PUF) [41]. However, the process variations also generate unstable bits, solving with calibration methodologies for the PUF application.…”
Section: Nvram Bit Cellmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, a TRNG and a non-volatile random access memory (NVRAM) can be unified, exploiting the metastability in the sense amplifier [7] or reading the bit cell noise [8]. On the other hand, a PUF-NVRAM is unified using the initial charges into the floating gates' bit cells [9]. Another method consists of the unification of a TRNG-crypto core based on the metastability response using hold violations [10].…”
Section: Introductionmentioning
confidence: 99%