The physical fingerprinting of a memristor crossbar array can be used to prove whether a digital key stored in the array is securely destroyed.
References
Rührmair, U. & van Dijk, M. 2013 IEEE Symposium on Security and Privacy https://doi.org/10.1109/SP.2013.27 (2013).
Jiang, H. et al. Nat. Electron. https://doi.org/10.1038/s41928-018-0146-5 (2018).
Strukov, D. B., Snider, G. S., Stewart, D. R. & Williams, R. S. Nature 453, 80–83 (2008).
Zhang, R. et al. Nanoscale 10, 2721–2726 (2018).
Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. IEEE Access 4, 61–80 (2016).
Rührmair, U. et al. in Cryptographic Hardware and Embedded Systems — CHES 2014 (eds Batina, L. & Robshaw, M.) 476–492 (Springer-Verlag, Berlin, 2014).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Xiong, W., Szefer, J. Memristive fingerprints prove key destruction. Nat Electron 1, 527–528 (2018). https://doi.org/10.1038/s41928-018-0149-2
Published:
Issue Date:
DOI: https://doi.org/10.1038/s41928-018-0149-2
- Springer Nature Limited