Novel TCAM-based PUF with improved reliability for hardware-entangled security
نویسندگان
چکیده
منابع مشابه
Complete Entangled Based Quantum Communication with Security
If, due to some catastrophe, our classical communication system is destroyed but quantum entangled state survived, in that entanglement age, it is widely believed, the whole world would be communication less. It is discussed that complete entangled based communication even with security is possible. In this context, the notion of cheating-free Bell’s inequality test is introduced.
متن کاملPUF based Smart Meter Security with Sx Chain
A smart meter is resource-constrained device, therefore lightweight cryptographic methods are required. Physical unclonable function(PUF) is promising hardware based lightweight security solution, which makes use of the inherent process variation in semiconductor fabrication process to generate unique ID. This paper presents an PUF based smart meter security with frequency synthesizer(Sx) chain...
متن کاملImproved Trie Partitioning for Cooler TCAM
Internet routers conduct router-table lookup based on the destination IP address of the incoming packet to decide where to forward the packet. TCAM, which uses parallelism to achieve lookup in a single cycle, is a simple and efficient solution for router-table lookup. The major drawback of TCAM is its high power consumption. Trie based architecture proposed in. [1] can be used to reduce TCAM po...
متن کاملA novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective
Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...
متن کاملEfficient Management of Groups in TCAM-Based Network Security System
To allow or protect the traffic in any network security system like firewalls and Intrusion Prevention System (IPS), a packet classification scheme is used along with the application of TCAM-based flow identification [1]. But these applications share a common demand, which is the ability to process, maintain, and correlate huge amount of events. In these applications, the rate of the events is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Electronics Express
سال: 2017
ISSN: 1349-2543
DOI: 10.1587/elex.14.20170716