Articles with "security primitives" as a keyword



Hardware and Information Security Primitives Based on 2D Materials and Devices

Sign Up to like & get
recommendations!
Published in 2022 at "Advanced Materials"

DOI: 10.1002/adma.202205365

Abstract: Hardware security is a major concern for the entire semiconductor ecosystem that accounts for billions of dollars in annual losses. Similarly, information security is a critical need for the rapidly proliferating edge devices that continuously… read more here.

Keywords: information security; hardware security; security; security primitives ... See more keywords

Security primitives for memoryless IoT devices based on Physical Unclonable Functions and True Random Number Generators

Sign Up to like & get
recommendations!
Published in 2024 at "Scientific Reports"

DOI: 10.1038/s41598-024-75373-6

Abstract: The article describes various security primitives for significantly resource-constrained devices, such as sensors or sensor networks, IoT devices, wearables, etc. — i.e., devices without programmable memory. It is dedicated to parts which cannot handle complex… read more here.

Keywords: unclonable functions; security primitives; cryptography; security ... See more keywords

Experimental Demonstrations of Security Primitives With Nonvolatile Memories

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Electron Devices"

DOI: 10.1109/ted.2019.2948950

Abstract: This article provides a comprehensive review of experimental work on security primitives based on emerging and mature nonvolatile memories (NVMs). The focus is on physically unclonable functions (PUFs) that exploit process-induced variations to generate a… read more here.

Keywords: security primitives; experimental demonstrations; security; demonstrations security ... See more keywords