Using Emerging Technologies For Hardware Security Beyond Pufs

Abstract

We discuss how the unique I-V characteristics offered by emerging, post-CMOS transistors can be used to enhance hardware security. Different from most existing work that exploits emerging technologies for hardware security, we (i) focus on transistor characteristics that either do not exist in, or are difficult to duplicate with MOSFETs, and (ii) aim to move beyond hardware implementations of physically unclonable functions (PUFs) and random number generators (RNGs).

Publication Date

4-25-2016

Publication Title

Proceedings of the 2016 Design, Automation and Test in Europe Conference and Exhibition, DATE 2016

Number of Pages

1544-1549

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

Socpus ID

84973650066 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/84973650066

This document is currently not available here.

Share

COinS