Buscar
Mostrando ítems 11-20 de 29
Artículo
Improved Generation of Identifiers, Secret Keys, and Random Numbers From SRAMs
(Institute of Electrical and Electronics Engineers, 2015)
This paper presents a method to simultaneously improve the quality of the identifiers, secret keys, and random numbers that can be generated from the start-up values of standard static random access memories (SRAMs). The ...
Artículo
A Unified Multibit PUF and TRNG based on Ring Oscillators for Secure IoT Devices
(IEEE, 2022)
Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) are cryptographic primitives very well suited for secure IoT devices. This paper proposes a circuit, named multibit-RO-PUF-TRNG, which offers ...
Artículo
Self-checking current-mode analogue memory
(Institute of Electrical and Electronics Engineers, 1997)
A long-term analogue memory based on continuous-time, currentmode algorithmic A/D-D/A converters is presented. It achieves an efficient performance in terms of speed, resolution, power, and area, while incorporating a ...
Artículo
Behavioral and Physical Unclonable Functions (BPUFs): SRAM Example
(Institute of Electrical and Electronics Engineers, 2021)
Physical Unclonable Functions (PUFs) have gained a great interest for their capability to identify devices uniquely and to be a lightweight primitive in cryptographic protocols. However, several reported attacks have ...
Ponencia
Algoritmo adaptativo con el grado de movimiento para el desentrelazado de vídeo
(2006)
En esta comunicación se presenta un algoritmo adaptativo con el movimiento para el desentrelazado de vídeo. Se basa en un sistema de inferencia difuso, que realiza una interpolación entre dos técnicas lineales en función ...
Artículo
A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes
(Multidisciplinary Digital Publishing Institute (MDPI), 2018)
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric ...
Artículo
Towards the IC implementation of adaptive fuzzy systems
(Institute of Electronics, Information and Communication Engineers, 1998)
The required building blocks of CMOS fuzzy chips capable of performing as adaptive fuzzy systems are described in this paper. The building blocks are designed with mixed-signal current-mode cells that contain low-resolution ...
Artículo
Soft computing techniques for video de-interlacing
(Institute of Electrical and Electronics Engineers (IEEE), 2011)
This paper presents the application of soft computing techniques to video processing. Specially, the research work has been focused on de-interlacing task. It is necessary whenever the transmission standard uses an ...
Artículo
A post-quantum biometric template protection scheme based on Learning Parity with Noise (LPN) commitments
(Institute of Electrical and Electronics Engineers (IEEE), 2020)
Biometric recognition has the potential to authenticate individuals by an intrinsic link between the individual and their physical, physiological and/or behavioral characteristics. This leads a higher security level than ...
Artículo
A Lightweight Remote Attestation Using PUFs and Hash-based Signatures for Low-end IoT Devices
(Elsevier, 2023)
Remote attestation is a powerful mechanism that allows a verifier to know if the hardware of an IoT (Internet-of-Thing) device (acting as a prover) has been counterfeited or tampered with and if its firmware has been ...