Secure-RRAM: A 40nm 16kb Compute-in-Memory Macro with Reconfigurability, Sparsity Control, and Embedded Security.
Wantong LiShanshi HuangXiaoyu SunHongwu JiangShimeng YuPublished in: CICC (2021)
Keyphrases
- security requirements
- security issues
- security level
- security mechanisms
- key management
- security measures
- cryptographic protocols
- knowledge base
- security protocols
- information security
- security management
- security analysis
- security properties
- user authentication
- control system
- data encryption
- data security
- access control
- security model
- security services
- mobile agent system
- stream cipher
- public key cryptosystem
- digital signature scheme
- security policies
- electronic voting
- sensitive data
- authentication mechanism
- diffie hellman
- key management scheme
- smart card
- security patterns
- key agreement protocol
- provably secure
- key agreement
- trusted computing
- operating system
- human operators
- authentication scheme
- encryption scheme
- high dimensional
- integrity verification
- key exchange protocol
- key distribution
- sparse representation
- public key cryptography
- key exchange
- embedded systems
- security architecture
- identity management
- elliptic curve