Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A puf taxonomy
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …
during communications. For security, it is important that these identities are complex, in order …
[HTML][HTML] The dichotomy of neural networks and cryptography: War and peace
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …
Lightweight hardware architectures for the present cipher in FPGA
CA Lara-Nino, A Diaz-Perez… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In recent years, the study of lightweight symmetric ciphers has gained interest due to the
increasing demand for security services in constrained computing environments, such as in …
increasing demand for security services in constrained computing environments, such as in …
CMOS image sensor based physical unclonable function for coherent sensor-level authentication
Y Cao, L Zhang, SS Zalivaka… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In the applications of biometric authentication and video surveillance, the image sensor is
expected to provide certain degree of trust and resiliency. This paper presents a new low …
expected to provide certain degree of trust and resiliency. This paper presents a new low …
A new class of digital circuits for the design of entropy sources in programmable logic
We propose a novel class of Digital Nonlinear Oscillators (DNOs) supporting complex
dynamics, including chaos, suitable for the definition of high-performance and low …
dynamics, including chaos, suitable for the definition of high-performance and low …
DRAM-based authentication using deep convolutional neural networks
Authentication is the act of proving that an integrated circuit (IC) is not counterfeit. One
application of a physical unclonable function (PUF) circuit is to authenticate the identity of …
application of a physical unclonable function (PUF) circuit is to authenticate the identity of …
A ring oscillator-based identification mechanism immune to aging and external working conditions
Physically unclonable functions (PUFs) are one of the most important breakthrough for
security of devices as they represent a low-cost means to provide authentication and secure …
security of devices as they represent a low-cost means to provide authentication and secure …
[HTML][HTML] Chaos-based physical unclonable functions
The concept presented in this paper fits into the current trend of highly secured hardware
authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical …
authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical …
A physical unclonable function based on a 2‐transistor subthreshold voltage divider
In this paper, a compact circuit solution for silicon‐based static physical unclonable functions
(PUFs) is presented. The proposed solution exploits the variability of a simple voltage …
(PUFs) is presented. The proposed solution exploits the variability of a simple voltage …
Processing In-Memory PUF Watermark Embedding with Cellular Memristor Network
The cellular neural network (CNN or CeNN) is known to be useful because of its suitability in
real-time processing, parallel processing, robustness, flexibility, and energy efficiency …
real-time processing, parallel processing, robustness, flexibility, and energy efficiency …