Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Hardware and information security primitives based on 2D materials and devices

A Wali, S Das - Advanced Materials, 2023 - Wiley Online Library
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …

Recent developments in wearable NEMS/MEMS-based smart infrared sensors for healthcare applications

B Padha, I Yadav, S Dutta, S Arya - ACS Applied Electronic …, 2023 - ACS Publications
Incorporating nano-and microelectromechanical systems (NEMS/MEMS)-based sensors in
clothing and develo** more compact and flexible devices have gained popularity recently …

Twin physically unclonable functions based on aligned carbon nanotube arrays

D Zhong, J Liu, M **ao, Y **e, H Shi, L Liu, C Zhao… - Nature …, 2022 - nature.com
Physically unclonable functions (PUFs) are a promising technology for generating
cryptographic primitives using random imperfections in a physical entity. However, the keys …

Hybrid low-voltage physical unclonable function based on inkjet-printed metal-oxide transistors

A Scholz, L Zimmermann, U Gengenbach… - Nature …, 2020 - nature.com
Modern society is striving for digital connectivity that demands information security. As an
emerging technology, printed electronics is a key enabler for novel device types with free …

An overview of critical applications of resistive random access memory

F Zahoor, A Nisar, UI Bature, H Abbas, F Bashir… - Nanoscale …, 2024 - pubs.rsc.org
The rapid advancement of new technologies has resulted in a surge of data, while
conventional computers are nearing their computational limits. The prevalent von Neumann …

Ferroelectric Stochasticity in 2D CuInP2S6 and Its Application for True Random Number Generator

S Kang, D Hong, B Das, SM Lee, JS Park… - Advanced …, 2024 - Wiley Online Library
True random number generators (TRNGs), which create cryptographically secure random
bitstreams, hold great promise in addressing security concerns regarding hardware …

Hardware security exploiting post-CMOS devices: Fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap

A Japa, MK Majumder, SK Sahoo… - IEEE Circuits and …, 2021 - ieeexplore.ieee.org
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …

Guidelines for the design of random Telegraph Noise-based true random number generators

T Zanotti, A Ranjan, SJ O'Shea… - … on Device and …, 2024 - ieeexplore.ieee.org
The development of a robust and secure hardware for the Internet of Things (IoT) and edge
computing requires improvements in the existing low-power and low-cost hardware security …