4.8 Article

Halide perovskite memristors as flexible and reconfigurable physical unclonable functions

期刊

NATURE COMMUNICATIONS
卷 12, 期 1, 页码 -

出版社

NATURE RESEARCH
DOI: 10.1038/s41467-021-24057-0

关键词

-

资金

  1. MOE Tier 2 grant [MOE2018-T2-2-083]
  2. MOE Tier 1 grants [RG87/16]
  3. NTU SUG
  4. NTU INT Funding CoE

向作者/读者索取更多资源

The study explores the use of one-dimensional halide perovskite memristors to design security primitives for key generation and device authentication, offering a new solution to the challenge of efficient roots of trust for resource-constrained hardware.
Physical Unclonable Functions (PUFs) address the inherent limitations of conventional hardware security solutions in edge-computing devices. Despite impressive demonstrations with silicon circuits and crossbars of oxide memristors, realizing efficient roots of trust for resource-constrained hardware remains a significant challenge. Hybrid organic electronic materials with a rich reservoir of exotic switching physics offer an attractive, inexpensive alternative to design efficient cryptographic hardware, but have not been investigated till date. Here, we report a breakthrough security primitive exploiting the switching physics of one dimensional halide perovskite memristors as excellent sources of entropy for secure key generation and device authentication. Measurements of a prototypical 1kb propyl pyridinium lead iodide (PrPyr[PbI3]) weak memristor PUF with a differential write-back strategy reveals near ideal uniformity, uniqueness and reliability without additional area and power overheads. Cycle-to-cycle write variability enables reconfigurability, while in-memory computing empowers a strong recurrent PUF construction to thwart machine learning attacks. Despite the impressive demonstrations with silicon and oxide memristors, realizing efficient roots of trust for resource-constrained hardware remains a challenge. Here, the authors exploit switching behavior in one dimensional perovskite memristors to design security primitives for key generation and device authentication.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据