Novel secret key generation techniques using memristor devices
暂无分享,去创建一个
Baker Mohammad | Chan Yeob Yeun | Maguy Abi Jaoude | Heba Abunahla | Dina Shehada | C. Yeun | M. A. Jaoude | B. Mohammad | D. Shehada | Heba Abunahla
[1] Bharathwaj Muthuswamy,et al. Implementing Memristor Based Chaotic Circuits , 2010, Int. J. Bifurc. Chaos.
[2] L. Chua. Memristor-The missing circuit element , 1971 .
[3] R. Williams,et al. Exponential ionic drift: fast switching and low volatility of thin-film memristors , 2009 .
[4] Shamik Das,et al. Switching-time analysis of binary-oxide memristors via a nonlinear model , 2012 .
[5] A. Adamatzky,et al. Drop-coated titanium dioxide memristors , 2012, 1205.2885.
[6] Baker Mohammad,et al. Modeling and device parameter design to improve reset time in binary-oxide memristors , 2014 .
[7] Alexis T. Bell,et al. A Study of Oxygen Vacancy Formation and Annihilation in Submonolayer Coverages of TiO2 Dispersed on MCM-48† , 2010 .
[8] Miodrag Potkonjak,et al. The bidirectional polyomino partitioned PPUF as a hardware security primitive , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[9] Yiping Yao,et al. Multi-state resistive switching memory with secure information storage in Au/BiFe0.95Mn0.05O3/La5/8Ca3/8MnO3 heterostructure , 2012 .
[10] Atsushi Uchida,et al. Generation of information theoretic secure keys using a chaotic semiconductor laser , 2003 .
[11] Leon O. Chua. Resistance switching memories are memristors , 2011 .
[12] Miodrag Potkonjak,et al. Hardware security strategies exploiting nanoelectronic circuits , 2013, 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC).
[13] James A. Bain,et al. Computational investigations into the operating window for memristive devices based on homogeneous ionic motion , 2011 .
[14] Miodrag Potkonjak,et al. Nano-PPUF: A Memristor-Based Security Primitive , 2012, 2012 IEEE Computer Society Annual Symposium on VLSI.
[15] Sachhidh Kannan,et al. Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[16] D. Stewart,et al. The missing memristor found , 2008, Nature.
[17] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[18] Jörg Rothe,et al. Some facets of complexity theory and cryptography: A five-lecture tutorial , 2001, CSUR.
[19] Ahmad-Reza Sadeghi,et al. Memristor PUFs: A new generation of memory-based Physically Unclonable Functions , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[20] J. Yang,et al. Switching dynamics in titanium dioxide memristive devices , 2009 .
[21] R. Williams,et al. Coupled ionic and electronic transport model of thin-film semiconductor memristive behavior. , 2009, Small.
[22] Hongxia Wang,et al. Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .
[23] J. Yang,et al. Memristive switching mechanism for metal/oxide/metal nanodevices. , 2008, Nature nanotechnology.