2016
DOI: 10.1145/2790302
|View full text |Cite
|
Sign up to set email alerts
|

STT-MRAM-Based PUF Architecture Exploiting Magnetic Tunnel Junction Fabrication-Induced Variability

Abstract: Physically Unclonable Functions (PUFs) are emerging cryptographic primitives used to implement lowcost device authentication and secure secret key generation. Weak PUFs (i.e., devices able to generate a single signature or to deal with a limited number of challenges) are widely discussed in literature. One of the most investigated solutions today is based on SRAMs. However, the rapid development of low-power, high-density, high-performance SoCs has pushed the embedded memories to their limits and opened the fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 16 publications
0
28
0
Order By: Relevance
“…PUFs can be categorized into two classes: weak PUFs and strong PUFs [1,9]. Weak PUFs have one or few practical and valid inputs, the so-called challenge in literature [1,9].…”
Section: Background a Physical Unclonable Functionsmentioning
confidence: 99%
See 3 more Smart Citations
“…PUFs can be categorized into two classes: weak PUFs and strong PUFs [1,9]. Weak PUFs have one or few practical and valid inputs, the so-called challenge in literature [1,9].…”
Section: Background a Physical Unclonable Functionsmentioning
confidence: 99%
“…PUFs can be categorized into two classes: weak PUFs and strong PUFs [1,9]. Weak PUFs have one or few practical and valid inputs, the so-called challenge in literature [1,9]. On the contrary, strong PUFs have a large number of challenges within a finite timeframe [1,9].…”
Section: Background a Physical Unclonable Functionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, PUFs are suitable to be the digital identity of devices on which they are embedded. So far, a significant number of PUF architectures has been introduced, covering delay-based PUFs (Arbiter [1], Ring Oscillator [2], Anderson [3], CNN-based [4]), which use pairs of symmetric paths for a digital contest to establish the output, and memory-based PUFs (SRAM [5], Butterfly [6], STT-MRAM [7]), which exploit the random initial pattern of a memory cell when being powered up.…”
Section: A Ring Oscillator-based Identification Mechanismmentioning
confidence: 99%