Issue 1, 2025

Concealable physical unclonable function generation and an in-memory encryption machine using vertical self-rectifying memristors

Abstract

The importance of hardware security increases significantly to protect the vast amounts of private data stored on edge devices. Physical unclonable functions (PUFs) are gaining prominence as hardware security primitives due to their ability to generate true random digital keys by exploiting the inherent randomness of the physical devices. Traditional approaches, however, require significant data movement between memory units and PUF generation circuits to perform encryption, presenting considerable energy efficiency and security challenges. This study introduces an innovative approach where PUF key generation and encryption are accomplished in the same vertically integrated resistive random access memory (V-RRAM), alleviating the data movement issue. The proposed V-RRAM encryption machine offers concealable PUFs, high area efficiency, and multi-thread data handling using parallel XOR logic operations. The encryption machine is compared with other machines, demonstrating the highest spatiotemporal cost-effectiveness.

Graphical abstract: Concealable physical unclonable function generation and an in-memory encryption machine using vertical self-rectifying memristors

Supplementary files

Transparent peer review

To support increased transparency, we offer authors the option to publish the peer review history alongside their article.

View this article’s peer review history

Article information

Article type
Communication
Submitted
21 Aug 2024
Accepted
06 Nov 2024
First published
07 Nov 2024

Nanoscale Horiz., 2025,10, 113-123

Concealable physical unclonable function generation and an in-memory encryption machine using vertical self-rectifying memristors

J. M. Cho, S. S. Kim, T. W. Park, D. H. Shin, Y. R. Kim, H. J. Park, D. Y. Kim, S. H. Lee, T. Park and C. S. Hwang, Nanoscale Horiz., 2025, 10, 113 DOI: 10.1039/D4NH00420E

To request permission to reproduce material from this article, please go to the Copyright Clearance Center request page.

If you are an author contributing to an RSC publication, you do not need to request permission provided correct acknowledgement is given.

If you are the author of this article, you do not need to request permission to reproduce figures and diagrams provided correct acknowledgement is given. If you want to reproduce the whole article in a third-party publication (excluding your thesis/dissertation for which permission is not required) please go to the Copyright Clearance Center request page.

Read more about how to correctly acknowledge RSC content.

Social activity

Spotlight

Advertisements