Rahman et al., 2016 - Google Patents
Reliability vs. security: Challenges and opportunities for developing reliable and secure integrated circuitsRahman et al., 2016
View PDF- Document ID
- 570659117834522069
- Author
- Rahman F
- Forte D
- Tehranipoor M
- Publication year
- Publication venue
- 2016 IEEE International Reliability Physics Symposium (IRPS)
External Links
Snippet
As technology further scales, devices offer better performance with faster speed and lower power albeit at the cost of reliability. Advanced technology nodes introduce higher variations in manufacturing processes, and devices experience greater aging and environmental …
- 230000032683 aging 0 abstract description 65
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H03—BASIC ELECTRONIC CIRCUITRY
- H03K—PULSE TECHNIQUE
- H03K3/00—Circuits for generating electric pulses; Monostable, bistable or multistable circuits
- H03K3/02—Generators characterised by the type of circuit or by the means used for producing pulses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alioto | Trends in hardware security: From basics to ASICs | |
Halak | Physically unclonable functions | |
Rahman et al. | ARO-PUF: An aging-resistant ring oscillator PUF design | |
Rahman et al. | An aging-resistant RO-PUF for reliable key generation | |
Yang et al. | 14.2 A physically unclonable function with BER< 10− 8 for robust chip authentication using oscillator collapse in 40nm CMOS | |
Mathew et al. | 2.4 Gbps, 7 mW all-digital PVT-variation tolerant true random number generator for 45 nm CMOS high-performance microprocessors | |
Cao et al. | A low power diode-clamped inverter-based strong physical unclonable function for robust and lightweight authentication | |
Rahman et al. | Reliability vs. security: Challenges and opportunities for developing reliable and secure integrated circuits | |
Stanzione et al. | CMOS silicon physical unclonable functions based on intrinsic process variability | |
Karimi et al. | Impact of aging on the reliability of delay PUFs | |
Zhao et al. | A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise | |
Khan et al. | An ultra-low power, reconfigurable, aging resilient RO PUF for IoT applications | |
Kumar et al. | Side-channel assisted modeling attacks on feed-forward arbiter PUFs using silicon data | |
Liang et al. | A wide-range variation-resilient physically unclonable function in 28 nm | |
Khan et al. | A symmetric D flip-flop based PUF with improved uniqueness | |
Yehoshuva et al. | A survey of security attacks on silicon based weak PUF architectures | |
Yu et al. | Interconnect-based PUF with signature uniqueness enhancement | |
Kurra et al. | A secure arbiter physical unclonable functions (PUFs) for device authentication and identification | |
US11861050B2 (en) | SR flip-flop based physical unclonable functions for hardware security | |
Park et al. | A BER-suppressed PUF with an amplification of process mismatch effect in an oscillator collapse topology | |
Tehranipoor et al. | Hardware security primitives | |
Sahoo et al. | A novel aging tolerant RO-PUF for low power application | |
Karimi et al. | Predictive aging of reliability of two delay PUFs | |
Sahoo et al. | A novel configurable ring oscillator PUF with improved reliability using reduced supply voltage | |
Halak et al. | Physically unclonable functions: Design principles and evaluation metrics |