Loading...
Loading...

Go to the content (press return)

RRAM based cell for hardware security applications

Author
Arumi, D.; Manich, S.; Rodriguez-Montanes, R.
Type of activity
Presentation of work at congresses
Name of edition
1st IEEE International Verification and Security Workshop
Date of publication
2016
Presentation's date
2016-07
Book of congress proceedings
2016 1st IEEE International Verification and Security Workshop (IVSW 2016): Sant Feliu de Guixols, Spain: 4-6 July 2016
First page
7
Last page
12
DOI
https://doi.org/10.1109/IVSW.2016.7566599 Open in new window
Repository
http://hdl.handle.net/2117/91350 Open in new window
URL
http://ieeexplore.ieee.org/document/7566599/ Open in new window
Abstract
Resistive random access memories (RRAMs)have arisen as a competitive candidate for non-volatile memories due to their scalability, simple structure, fast switching speed and compatibility with conventional back-end processes. The stochastic switching mechanism and intrinsic variability of RRAMs will poses challenges that must be overcome prior to their massive memory commercialization. However, these very same features open a wide range of potential applications for these devices in hardware sec...
Citation
Arumi, D., Manich, S., Rodriguez, R. RRAM based cell for hardware security applications. A: International Verification and Security Workshop. "Proceedings of the 2016 1st IEEE International Verification and Security Workshop (IVSW)". St. Feliu de Guixols: 2016, p. 7-12.
Keywords
1T1R array structure, PUF like primitive, RRAM based cell, RRAMs, electrical simulations, hardware security applications, intrinsic variability, memory commercialization, modified 1 transistor-1 resistor array structure, nonvolatile memories, paralled cells, physical unclonable function like primitive, random bit generation, random-access storage, resistive random access memories, security of data, stochastic behavior, stochastic processes, stochastic switching mechanism
Group of research
QINE - Low Power Design, Test, Verification and Security ICs

Participants