期刊
ADVANCED ELECTRONIC MATERIALS
卷 7, 期 12, 页码 -出版社
WILEY
DOI: 10.1002/aelm.202100536
关键词
cryptographic hash functions; memristor; physical unclonable function; resistive random access memory; true random number generator
资金
- National Research Foundation (NRF), Singapore [NRF-CRP21-2018-003]
- NRF AME programmatic fund titled Hardware-Software Co-optimisation for Deep Learning [A1892b0026]
Advancements in trusted system environments now rely on hardware-based security provided by emerging nonvolatile memory devices like RRAM. RRAM offers high-density integration, outstanding performance, and multi-bit storage capability. These characteristics make RRAM suitable for designing security hardware, such as Physical Unclonable Function and hash function.
Nowadays, advancements in the design of trusted system environments are relying on security provided by hardware-based primitives, while replacing resource-hungry software security measures. Emerging nonvolatile memory devices are promising candidates to provide the required hardware security functionalities at very low area-energy-runtime budget. Resistive random access memory (RRAM) offers high-density integration with outstanding performance among the state-of-the-art nonvolatile memory devices. The RRAM device technology is currently getting significant attention from both academia and industry for constructing beyond Von Neumann architectures. This technology's strength is its scalable two-terminal structure, the availability of wide range of functional materials, and multi-bit storage capability. The fluctuations in switching resistances, random telegraph noise, and sneak path current are detrimental characteristics of RRAM integrations for storage and in-memory computing applications, and more research focuses on alleviating these effects. Interestingly, these characteristics make them suitable for designing security hardware. In recent times, there has been significant progress in the design and analysis of RRAM-based security primitives such as, Physical Unclonable Function, true random number generator, and hash function. This review discusses the detailed developments in RRAM security and presents the demanded security requirement and available opportunities to be explored.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据