Novel TCAM-based PUF with improved reliability for hardware-entangled security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Complete Entangled Based Quantum Communication with Security

If, due to some catastrophe, our classical communication system is destroyed but quantum entangled state survived, in that entanglement age, it is widely believed, the whole world would be communication less. It is discussed that complete entangled based communication even with security is possible. In this context, the notion of cheating-free Bell’s inequality test is introduced.

متن کامل

PUF based Smart Meter Security with Sx Chain

A smart meter is resource-constrained device, therefore lightweight cryptographic methods are required. Physical unclonable function(PUF) is promising hardware based lightweight security solution, which makes use of the inherent process variation in semiconductor fabrication process to generate unique ID. This paper presents an PUF based smart meter security with frequency synthesizer(Sx) chain...

متن کامل

Improved Trie Partitioning for Cooler TCAM

Internet routers conduct router-table lookup based on the destination IP address of the incoming packet to decide where to forward the packet. TCAM, which uses parallelism to achieve lookup in a single cycle, is a simple and efficient solution for router-table lookup. The major drawback of TCAM is its high power consumption. Trie based architecture proposed in. [1] can be used to reduce TCAM po...

متن کامل

A novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective

Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...

متن کامل

Efficient Management of Groups in TCAM-Based Network Security System

To allow or protect the traffic in any network security system like firewalls and Intrusion Prevention System (IPS), a packet classification scheme is used along with the application of TCAM-based flow identification [1]. But these applications share a common demand, which is the ability to process, maintain, and correlate huge amount of events. In these applications, the rate of the events is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Electronics Express

سال: 2017

ISSN: 1349-2543

DOI: 10.1587/elex.14.20170716