Skip to search formSkip to main contentSkip to account menu
DOI:10.1038/nnano.2016.1 - Corpus ID: 1159252
@article{Hu2016PhysicallyUC, title={Physically unclonable cryptographic primitives using self-assembled carbon nanotubes.}, author={Zhaoying Hu and Jose Miguel M Lobez Comeras and Hongsik Park and Jianshi Tang and Ali Afzali and George S. Tulevski and James B. Hannon and Michael Liehr and Shu-Jen Han}, journal={Nature nanotechnology}, year={2016}, volume={11 6}, pages={ 559-565 }, url={https://api.semanticscholar.org/CorpusID:1159252}}
- Zhaoying Hu, Jose Miguel M Lobez Comeras, Shu-Jen Han
- Published in Nature Nanotechnology 1 June 2016
- Computer Science, Engineering, Materials Science, Physics
This work shows that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes, and provides a significantly higher level of security than conventional binary-bit architecture with the same key size.
125 Citations
2
19
7
125 Citations
- Zhaoying HuShu-Jen Han
- 2017
Computer Science, Engineering
2017 IEEE International Symposium on Hardware…
Two-dimensional random bits array with over 2000 bits were fabricated by the ion-exchange chemistry method to assemble nanotubes into patterned HfO2 trenches, with the optimized trench width that maximizes the entropy.
- 2
- Donglai ZhongJingxia Liu Zhiyong Zhang
- 2022
Engineering, Materials Science
Nature Electronics
This work shows that pairs of identical PUFs (twin PUFs) can be fabricated together on an aligned carbon nanotube array and used for secure communication without key pre-extraction and storage and exhibits high uniformity, uniqueness, randomness and reliability.
- 16
- PDF
- Nitish KumarJialuo ChenMonodeep KarS. SitaramanS. MukhopadhyaySatish Kumar
- 2019
Engineering, Materials Science
IEEE Internet of Things Journal
Multigated CNT field effect transistors (CNT-FETs)-based PUFs, where inherent randomness of CNT network and a multigated channel are utilized to generate high-quality random keys are proposed, which can create significantly more entropy than binary or ternary keys of the same size generated by typical PUFs.
- 9
- PDF
- P. Eder
- 2023
Materials Science, Engineering
This work has built the foundation for implementing a PUF consisting of a TMD, namely tungsten disulfide, which has been synthesized using chemical vapor deposition in the close proximity approach.
- Simon BöttgerFlorian Frank S. Katzenbeisser
- 2023
Engineering, Materials Science
2023 IEEE 23rd International Conference on…
This work demonstrates exceptionally robust CNT-based PUFs exhibiting a highly uniform distribution, based on the clearly distinguishable states of the encapsulated PUF cells, leading to fully stable hardware-stored binary keys.
- 2
- D. ArmstrongB. NasriR. KarriD. Shahrjerdi
- 2017
Computer Science, Engineering
2017 IEEE SOI-3D-Subthreshold Microelectronics…
A hybrid silicon CMOS-nanotube PUF circuit that uses the variations of nanotube transistors to generate a random response to increase the immunity of the hybrid PUF against an unauthorized duplication is introduced.
- Bangjie ShaoTsz Hin Choy Y. Chai
- 2020
Computer Science, Engineering
Nano Research
The generated PUF keys exhibit good randomness and uniqueness, providing a possibility for harvesting highly secured PUF devices with two-dimensional materials.
- 12
- Highly Influenced
- Anusha VenkataramanE. AmadiC. Papadopoulos
- 2022
Engineering, Computer Science
Micro
Evaluation of the keys using Hamming inter-distance values indicates that performance is improved by varying the ratio of molecules to nanoparticles in the network, which demonstrates self-assembly as a potential path toward implementing molecular-scale hardware security primitives.
- William A. Gaviria RojasJ. McMorrow M. Hersam
- 2017
Materials Science, Engineering
Nano letters
The first TRNG is demonstrated using static random access memory (SRAM) cells based on solution-processed SWCNTs that digitize thermal noise to generate random bits, resulting in an output stream that passes standardized statistical tests for randomness.
- 37
- Florian FrankSimon Böttger Sascha Hermann
- 2023
Engineering, Materials Science
Nanomaterials
This work demonstrated that the proposed CNT-based PUFs are exceptionally robust with an average fractional intra-device Hamming distance well below 0.01 both at room temperature and under varying temperatures in the range from 23 ∘C to 120 ∙C.
...
...
45 References
- M. BhargavaK. Mai
- 2014
Computer Science, Engineering
This work presents a highly-reliable, PUF-based, cryptographic key generator that uses no ECC, but instead uses built-in self-test to determine which PUF bits are reliable and only uses those bits for key generation.
- 96
- PDF
- G. RoseN. McDonaldLok K. YanB. Wysocki
- 2013
Computer Science, Engineering
2013 IEEE/ACM International Conference on…
A novel memristive PUF (M-PUF) architecture that utilizes variations in the write-time of a memristor as an entropy source is described and results presented show strong statistical performance for the M- PUF in terms of uniqueness, uniformity, and bit-aliasing.
- 90
- PDF
- U. RührmairS. DevadasF. Koushanfar
- 2012
Computer Science, Engineering
This chapter provides a classification for past and ongoing work in physical disorder based security alongside with security analyses and implementation examples and outlines some open problems and future research opportunities.
- 179
- PDF
- Frederik ArmknechtRoel MaesA. SadeghiB. SunarP. Tuyls
- 2009
Computer Science, Engineering
ASIACRYPT
A block cipher is constructed based on PUF-PRFs that allows simultaneous protection against algorithmic and physical attackers, in particular against memory attacks, and a concrete instantiation based on established SRAM technology that closes these gaps.
- 116
- PDF
- Jeroen DelvauxDawu GuDries SchellekensI. Verbauwhede
- 2015
Computer Science, Engineering
IEEE Transactions on Computer-Aided Design of…
This paper is the first to provide an in-depth and comprehensive literature overview on HDAs, and does expose new threats regarding helper data leakage and manipulation.
- 212
- PDF
- G. RoseJeyavijayan RajendranN. McDonaldR. KarriM. PotkonjakB. Wysocki
- 2013
Computer Science, Engineering
2013 18th Asia and South Pacific Design…
This paper provides an overview of memristor based PUF structures and circuits that illustrate the potential for nanoelectronic hardware security solutions.
- 34
- PDF
- R. HorstmeyerB. JudkewitzI. VellekoopChanghuei Yang
- 2013
Computer Science, Engineering
Scientific Reports
The ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of the authors' increasingly mobile communication culture.
- 93 [PDF]
- Shu-Jen HanS. OidaHongsik ParkJ. HannonG. TulevskiW. Haensch
- 2013
Engineering, Materials Science
2013 IEEE International Electron Devices Meeting
Complementary logic gates based on chemically assisted directed assembly of solution carbon nanotubes with a high semiconducting purity (~91%) are demonstrated. Air stable, high quality carbon…
- 14
- S. KatzenbeisserÜnal KoçabasVladimir RožićA. SadeghiI. VerbauwhedeC. Wachsmann
- 2012
Computer Science, Engineering
CHES
This paper presents the first large-scale security analysis of ASIC implementations of the five most popular intrinsic electronic PUF types, including arbiter, ring oscillator, SRAM, flip-flop and latch PUFs, and quantifies the robustness and unpredictability properties of PUFs.
- 251
- PDF
- Hongsik ParkA. Afzali W. Haensch
- 2012
Engineering, Materials Science
Nature nanotechnology
It is shown that ion-exchange chemistry can be used to fabricate arrays of individually positioned carbon nanotubes with a density as high as 1×10(9)cm(-2)-two orders of magnitude higher than previous reports.
- 320
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers