Using Emerging Technologies For Hardware Security Beyond Pufs
Abstract
We discuss how the unique I-V characteristics offered by emerging, post-CMOS transistors can be used to enhance hardware security. Different from most existing work that exploits emerging technologies for hardware security, we (i) focus on transistor characteristics that either do not exist in, or are difficult to duplicate with MOSFETs, and (ii) aim to move beyond hardware implementations of physically unclonable functions (PUFs) and random number generators (RNGs).
Publication Date
4-25-2016
Publication Title
Proceedings of the 2016 Design, Automation and Test in Europe Conference and Exhibition, DATE 2016
Number of Pages
1544-1549
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
Copyright Status
Unknown
Socpus ID
84973650066 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/84973650066
STARS Citation
Chen, An; Hu, X. Sharon; Jin, Yier; Niemier, Michael; and Yin, Xunzhao, "Using Emerging Technologies For Hardware Security Beyond Pufs" (2016). Scopus Export 2015-2019. 4273.
https://stars.library.ucf.edu/scopus2015/4273