2020
DOI: 10.1007/978-3-030-52243-8_36
|View full text |Cite
|
Sign up to set email alerts
|

Extended Protocol Using Keyless Encryption Based on Memristors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…We conducted an experiment in which we calculated the number of visits for each ReRAM cell with different current values. We used the same dataset that has been used in [3] and [13]. The data is the output of reading the 128 cells with eight different currents.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We conducted an experiment in which we calculated the number of visits for each ReRAM cell with different current values. We used the same dataset that has been used in [3] and [13]. The data is the output of reading the 128 cells with eight different currents.…”
Section: Methodsmentioning
confidence: 99%
“…The hash function has several common algorithms such as MD5, SHA-1, SHA-2, NTLM, and LANMAN [14] [15]. According to [3] and [13], the SHA-3-512 was selected to be used in the protocol implementation, which is one of the hash functions recommended by the NIST.…”
Section: Toolsmentioning
confidence: 99%
See 3 more Smart Citations