Citation: | LI Xiangyu, LIU Dongsheng, WANG Pengjun, LI Lewei, ZHANG Yuejun. Design of Soft Physical Unclonable Functions Based on Tunneling Magnetic ResistanceMagnetometers[J]. Journal of Electronics & Information Technology, 2023, 45(9): 3184-3192. doi: 10.11999/JEIT230365 |
[1] |
LI Jiaxian, LIU Hao, and BI Tianshu. Tunnel magnetoresistance-based noncontact current sensing and measurement method[J]. IEEE Transactions on Instrumentation and Measurement, 2022, 71: 9503609. doi: 10.1109/TIM.2022.3152240
|
[2] |
韩秀峰, 刘厚方, 张佳, 等. 新型磁性隧道结材料及其隧穿磁电阻效应[J]. 中国材料进展, 2013, 32(6): 339–353. doi: 10.7502/j.issn.1674-3962.2013.06.02
HAN Xiufeng, LIU Houfang, ZHANG Jia, et al. A typical magnetic tunnel junction material and effects of tunnel magneto-resistance[J]. Materials China, 2013, 32(6): 339–353. doi: 10.7502/j.issn.1674-3962.2013.06.02
|
[3] |
CHINENKOV M, DJUZHEV N, BESPALOV V, et al. Magnetoresistive sensor with high sensitivity: Self-aligned magnetic structures[C]. 2017 IEEE International Magnetics Conference, Dublin, Ireland, 2017.
|
[4] |
张朝阳, 虞伟乔, 陆鹏飞. 基于远场等效磁矩的潜艇磁防护技术[J]. 舰船科学技术, 2015, 37(2): 97–100. doi: 10.3404/j.issn.1672-7649.2015.02.020
ZHANG Zhaoyang, YU Weiqiao, and LU Pengfei. Research on the submarine's magnetic defense technology based on the far field equivalent magnetic moment[J]. Ship Science and Technology, 2015, 37(2): 97–100. doi: 10.3404/j.issn.1672-7649.2015.02.020
|
[5] |
YANG Huiwen, WENG Ling, WANG Bowen, et al. Design and characterization of high-sensitivity magnetostrictive tactile sensor array[J]. IEEE Sensors Journal, 2022, 22(5): 4004–4013. doi: 10.1109/JSEN.2022.3145822
|
[6] |
CAI Hao, GUO Yanan, LIU Bo, et al. Proposal of analog in-memory computing with magnified tunnel magnetoresistance ratio and universal STT-MRAM cell[J]. IEEE Transactions on Circuits and Systems I:Regular Papers, 2022, 69(4): 1519–1531. doi: 10.1109/TCSI.2022.3140769
|
[7] |
EBRAHIMABADI M, YOUNIS M, and KARIMI N. A PUF-based modeling-attack resilient authentication protocol for IoT devices[J]. IEEE Internet of Things Journal, 2022, 9(5): 3684–3703. doi: 10.1109/JIOT.2021.3098496
|
[8] |
LEWIS J A. Economic impact of cybercrime[EB/OL]. https://www.csis.org/analysis/economic-impact-cybercrime, 2018.
|
[9] |
龚越, 叶靖, 胡瑜, 等. 内建自调整的仲裁器物理不可克隆函数[J]. 计算机辅助设计与图形学学报, 2017, 29(9): 1734–1739. doi: 10.3969/j.issn.1003-9775.2017.09.018
GONG Yue, YE Jing, HU Yu, et al. Built-in self adjustable arbiter PUF[J]. Journal of Computer-Aided Design &Computer Graphics, 2017, 29(9): 1734–1739. doi: 10.3969/j.issn.1003-9775.2017.09.018
|
[10] |
孙子文, 叶乔. 利用震荡环频率特性提取多位可靠信息熵的物理不可克隆函数研究[J]. 电子与信息学报, 2021, 43(1): 234–241. doi: 10.11999/JEIT191013
SUN Ziwen and YE Qiao. Study on the physical unclonable function of the reliable information entropy extracted by the frequency characteristic of oscillating ring[J]. Journal of Electronics &Information Technology, 2021, 43(1): 234–241. doi: 10.11999/JEIT191013
|
[11] |
LI Gang, WANG Pengjun, MA Xuejiao, et al. A 215-F2 bistable physically unclonable function with an ACF of <0.005 and a native bit instability of 2.05% in 65-nm CMOS process[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020, 28(11): 2290–2299. doi: 10.1109/TVLSI.2020.3014892
|
[12] |
GOLANBARI M S, KIAMEHR S, BISHNOI R, et al. Reliable memory PUF design for low-power applications[C]. The 19th International Symposium on Quality Electronic Design, Santa Clara, USA, 2018: 207–213.
|
[13] |
张培勇, 袁晓东, 王雪洁, 等. 基于D触发器的物理不可克隆函数[J]. 浙江大学学报:理学版, 2019, 46(1): 32–38. doi: 10.3785/j.issn.1008-9497.2019.01.005
ZHANG Peiyong, YUAN Xiaodong, WANG Xuejie, et al. D flip-flop based physical unclonable functions[J]. Journal of Zhejiang University:Science Edition, 2019, 46(1): 32–38. doi: 10.3785/j.issn.1008-9497.2019.01.005
|
[14] |
LEE J W, LIM D, GASSEND B, et al. A technique to build a secret key in integrated circuits for identification and authentication applications[C]. 2004 Symposium on VLSI Circuits. Digest of Technical Papers, Honolulu, USA, 2004: 176–179.
|
[15] |
WILLERS O, HUTH C, GUAJARDO J, et al. MEMS gyroscopes as physical unclonable functions[C]. The 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016: 591–602.
|
[16] |
LABRADO C and THAPLIYAL H. Design of a piezoelectric-based physically unclonable function for IoT security[J]. IEEE Internet of Things Journal, 2019, 6(2): 2770–2777. doi: 10.1109/JIOT.2018.2874626
|
[17] |
吴少兵, 陈实, 李海, 等. TMR与GMR传感器1/f噪声的研究进展[J]. 物理学报, 2012, 61(9): 550–559. doi: 10.7498/aps.61.097504
WU Shaobing, CHEN Shi, LI Hai, et al. Researching progress of the 1/f noise in TMR and GMR sensors[J]. Acta Physica Sinica, 2012, 61(9): 550–559. doi: 10.7498/aps.61.097504
|
[18] |
KUSUDA Y. Auto correction feedback for ripple suppression in a chopper amplifier[J]. IEEE Journal of Solid-State Circuits, 2010, 45(8): 1436–1445. doi: 10.1109/JSSC.2010.2048142
|
[19] |
KUMAR R S A and KRISHNAPURA N. Multi-channel analog-to-digital conversion techniques using a continuous-time delta-sigma modulator without reset[J]. IEEE Transactions on Circuits and Systems I:Regular Papers, 2020, 67(11): 3693–3703. doi: 10.1109/TCSI.2020.3013691
|
[20] |
LIM D, LEE J W, GASSEND B, et al. Extracting secret keys from integrated circuits[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2005, 13(10): 1200–1205. doi: 10.1109/TVLSI.2005.859470
|
[21] |
张跃军, 汪鹏君, 李刚, 等. 基于信号传输理论的Glitch物理不可克隆函数电路设计[J]. 电子与信息学报, 2016, 38(9): 2391–2396. doi: 10.11999/JEIT151312
ZHANG Yuejun, WANG Pengjun, LI Gang, et al. Design of glitch physical unclonable functions circuit based on signal transmission theory[J]. Journal of Electronics &Information Technology, 2016, 38(9): 2391–2396. doi: 10.11999/JEIT151312
|
[22] |
SU Y, HOLLEMAN J, and OTIS B. A 1.6pJ/bit 96% stable chip-ID generating circuit using process variations[C]. 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers, San Francisco, USA, 2007: 406–411.
|
[23] |
ZHANG Jiliang, SHEN Chaoqun, GUO Zhiyang, et al. CT PUF: Configurable tristate PUF against machine learning attacks for IoT security[J]. IEEE Internet of Things Journal, 2022, 9(16): 14452–14462. doi: 10.1109/JIOT.2021.3090475
|
[24] |
QIU Pengfei, LYU Yongqiang, ZHANG Jiliang, et al. Physical unclonable functions-based linear encryption against code reuse attacks[C]. The 53rd Annual Design Automation Conference, Austin, USA, 2016: 75.
|