Enhancing Secure Elements—Technology and Architecture

作者: Bertrand Cambou

DOI: 10.1007/978-3-319-50380-6_10

关键词:

摘要: Current secure elements that are mainly flash based operate at high power, slow access time, and they vulnerable to side channel attacks. We suggesting replace with ReRAMs faster much lower power. proposing the integration within memory of cryptographic primitives such as Physically Unclonable Functions (PUFs), Random Number Generators (RNG). Ternary logic, Machine Learning architectures brought enable design strong PUFs RNGs.

参考文章(31)
Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh, Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches cryptographic hardware and embedded systems. pp. 390- 406 ,(2011) , 10.1007/978-3-642-23951-9_26
L. Crippa, R. Micheloni, I. Motta, M. Sangalli, Nonvolatile Memories: NOR vs. NAND Architectures Springer, Berlin, Heidelberg. pp. 29- 53 ,(2008) , 10.1007/978-3-540-79078-5_2
Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan, Steven Swanson, Extracting device fingerprints from flash memory by exploiting physical variations trust and trustworthy computing. pp. 188- 201 ,(2011) , 10.1007/978-3-642-21599-5_14
Alexander Makarov, Viktor Sverdlov, Siegfried Selberherr, Modeling of the SET and RESET process in bipolar resistive oxide-based memory using Monte Carlo simulations NMA'10 Proceedings of the 7th international conference on Numerical methods and applications. pp. 87- 94 ,(2010) , 10.1007/978-3-642-18466-6_9
Fabio Roli, Blaine Nelson, Anthony D. Joseph, Pavel Laskov, J. Doug Tygar, Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371) Dagstuhl Manifestos. ,vol. 2, pp. 130- ,(2013) , 10.4230/DAGREP.2.9.109
Gargi Ghosh, Marius K. Orlowski, Write and Erase Threshold Voltage Interdependence in Resistive Switching Memory Cells IEEE Transactions on Electron Devices. ,vol. 62, pp. 2850- 2856 ,(2015) , 10.1109/TED.2015.2452411
Sun Yuan Kung, M. W. Mak, Shang-Hung Lin, MW Mak, S Lin, Biometric Authentication: A Machine Learning Approach ,(2004)
V. Yu. Kaganov, A. K. Korolev, M. N. Krylov, I. V. Mashechkin, M. I. Petrovskii, Machine Learning Methods in Authentication Problems Using Password Keystroke Dynamics Computational Mathematics and Modeling. ,vol. 26, pp. 398- 407 ,(2015) , 10.1007/S10598-015-9280-3