ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
RRAM based cell for hardware security applications
2016 1st IEEE International Verification and Security Workshop (IVSW)
◽
10.1109/ivsw.2016.7566599
◽
2016
◽
Cited By ~ 1
Author(s):
Daniel Arumi
◽
Salvador Manich
◽
Rosa Rodriguez-Montanes
Keyword(s):
Hardware Security
◽
Security Applications
Download Full-text
Related Documents
Cited By
References
Memristors for Hardware Security Applications
Advanced Electronic Materials
◽
10.1002/aelm.201800872
◽
2019
◽
Vol 5
(9)
◽
pp. 1800872
◽
Cited By ~ 2
Author(s):
Yachuan Pang
◽
Bin Gao
◽
Bohan Lin
◽
He Qian
◽
Huaqiang Wu
Keyword(s):
Hardware Security
◽
Security Applications
Download Full-text
Compact Sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security Applications
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
◽
10.1109/ntms.2019.8763825
◽
2019
◽
Author(s):
David Zooker
◽
Alexander Fish
◽
Osnat Keren
◽
Yoav Weizman
Keyword(s):
Optical Sensor
◽
Fault Injection
◽
Hardware Security
◽
Security Applications
Download Full-text
A write-time based memristive PUF for hardware security applications
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
◽
10.1109/iccad.2013.6691209
◽
2013
◽
Cited By ~ 49
Author(s):
Garrett S. Rose
◽
Nathan McDonald
◽
Lok-Kwong Yan
◽
Bryant Wysocki
Keyword(s):
Hardware Security
◽
Security Applications
Download Full-text
Optical Characterization of ZnO Nanoforest for Hardware Security Applications
2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO)
◽
10.1109/nano46743.2019.8993872
◽
2019
◽
Author(s):
Nafisa Noor
◽
Helena Silva
Keyword(s):
Hardware Security
◽
Optical Characterization
◽
Security Applications
Download Full-text
Silicon Proven $1.8~\mu\text{m}\times\,9.2\,\,\mu\text{m}$ 65-nm Digital Bit Generator for Hardware Security Applications
IEEE Transactions on Circuits & Systems II Express Briefs
◽
10.1109/tcsii.2019.2929158
◽
2019
◽
Vol 66
(10)
◽
pp. 1713-1717
◽
Cited By ~ 1
Author(s):
David Zooker
◽
Moshe Avital
◽
Yoav Weizman
◽
Alexander Fish
◽
Osnat Keren
Keyword(s):
Hardware Security
◽
Security Applications
Download Full-text
Random Seeding LFSR-Based TRNG for Hardware Security Applications
Integrated Intelligent Computing, Communication and Security - Studies in Computational Intelligence
◽
10.1007/978-981-10-8797-4_44
◽
2018
◽
pp. 427-434
◽
Cited By ~ 1
Author(s):
R. Shiva Prasad
◽
Anirudh Siripagada
◽
Santthosh Selvaraj
◽
N. Mohankumar
Keyword(s):
Hardware Security
◽
Security Applications
Download Full-text
Hardware security applications of emerging nonvolatile memories
2015 IEEE 11th International Conference on ASIC (ASICON)
◽
10.1109/asicon.2015.7516995
◽
2015
◽
Cited By ~ 1
Author(s):
An Chen
Keyword(s):
Hardware Security
◽
Security Applications
◽
Nonvolatile Memories
Download Full-text
A Low Power Hybrid CMOS-Memristor based Ring Oscillator for Hardware Security Applications
2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
◽
10.1109/rteict42901.2018.9012091
◽
2018
◽
Author(s):
Abhinav Sharma
◽
Kunwar Singh
◽
Puneet Singh Khurana
Keyword(s):
Low Power
◽
Hardware Security
◽
Ring Oscillator
◽
Security Applications
◽
Hybrid Cmos
Download Full-text
Noise Reduction via Chopper Stabilization of Fully Differential Temperature Sensors for Hardware Security Applications
2020 IEEE 14th Dallas Circuits and Systems Conference (DCAS)
◽
10.1109/dcas51144.2020.9330638
◽
2020
◽
Author(s):
Haoran Wei
◽
Mengting Yan
◽
Marvin Onabajo
Keyword(s):
Noise Reduction
◽
Hardware Security
◽
Temperature Sensors
◽
Fully Differential
◽
Chopper Stabilization
◽
Security Applications
Download Full-text
RRAM based random bit generation for hardware security applications
2016 Conference on Design of Circuits and Integrated Systems (DCIS)
◽
10.1109/dcis.2016.7845382
◽
2016
◽
Cited By ~ 4
Author(s):
Daniel Arumi
◽
Salvador Manich
◽
Rosa Rodriguez-Montanes
◽
Michael Pehl
Keyword(s):
Hardware Security
◽
Security Applications
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close