2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2013
DOI: 10.1109/iccad.2013.6691209
|View full text |Cite
|
Sign up to set email alerts
|

A write-time based memristive PUF for hardware security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
72
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 91 publications
(81 citation statements)
references
References 24 publications
0
72
0
Order By: Relevance
“…In addition, memristor-based PUFs are also predicted to offer more resistance to model building attacks than purely CMOS-based PUF circuits, since memristors are bidirectional devices, while MOSFET is a unidirectional device [23]. Simulation based studies of memristor PUF circuits have demonstrated that they are capable of achieving close-to-ideal values for the statistical performance metrics, which are often superior compared to the values attained by CMOS-only PUF circuits [20,21].…”
Section: Memristor Based Hardware Security Primitivesmentioning
confidence: 94%
See 2 more Smart Citations
“…In addition, memristor-based PUFs are also predicted to offer more resistance to model building attacks than purely CMOS-based PUF circuits, since memristors are bidirectional devices, while MOSFET is a unidirectional device [23]. Simulation based studies of memristor PUF circuits have demonstrated that they are capable of achieving close-to-ideal values for the statistical performance metrics, which are often superior compared to the values attained by CMOS-only PUF circuits [20,21].…”
Section: Memristor Based Hardware Security Primitivesmentioning
confidence: 94%
“…There are two main ideas behind using memristors as PUF circuits, and the protocols built around them: write-time based output response variation [20][21][22] and variation of output voltages in memristor-based crossbar "polynominoes" [7,23,24]. We describe these two schemes in detail below.…”
Section: Memristor Based Hardware Security Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…This phenomenon has opened up the possibility of harnessing the unique properties of these nanodevices to build circuits that are superior to those that can be built using the current CMOS technology. Memristors [Chua 1971;Strukov et al 2008], especially metal-oxide memristors, are an exciting new addition to this class of nanodevices, which have the added advantage that their processing technology is relatively compatible with CMOS [Rose et al 2013a]. This makes the fabrication of both memristor and CMOS devices to build hybrid memristor-CMOS devices feasible, thus combining the best of both worlds.…”
Section: Introductionmentioning
confidence: 99%
“…Beyond memory applications, RRAM also holds promise for use in performing logic functions, 6 mimicking neuromorphic activities, 7 physically unclonable function (PUF) based hardware encryption, 8 or signal processing. 9 One challenge for implementing RRAM for these applications is the significant programming variation in RRAM resistance states, which includes cycle-to-cycle variation and stochastic switching, producing unwanted bit flip.…”
mentioning
confidence: 99%