The physical fingerprinting of a memristor crossbar array can be used to prove whether a digital key stored in the array is securely destroyed.
This is a preview of subscription content, access via your institution
Access options
Access Nature and 54 other Nature Portfolio journals
Get Nature+, our best-value online-access subscription
$29.99 / 30 days
cancel any time
Subscribe to this journal
Receive 12 digital issues and online access to articles
$119.00 per year
only $9.92 per issue
Rent or buy this article
Prices vary by article type
from$1.95
to$39.95
Prices may be subject to local taxes which are calculated during checkout
References
Rührmair, U. & van Dijk, M. 2013 IEEE Symposium on Security and Privacy https://doi.org/10.1109/SP.2013.27 (2013).
Jiang, H. et al. Nat. Electron. https://doi.org/10.1038/s41928-018-0146-5 (2018).
Strukov, D. B., Snider, G. S., Stewart, D. R. & Williams, R. S. Nature 453, 80–83 (2008).
Zhang, R. et al. Nanoscale 10, 2721–2726 (2018).
Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. IEEE Access 4, 61–80 (2016).
Rührmair, U. et al. in Cryptographic Hardware and Embedded Systems — CHES 2014 (eds Batina, L. & Robshaw, M.) 476–492 (Springer-Verlag, Berlin, 2014).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Xiong, W., Szefer, J. Memristive fingerprints prove key destruction. Nat Electron 1, 527–528 (2018). https://doi.org/10.1038/s41928-018-0149-2
Published:
Issue Date:
DOI: https://doi.org/10.1038/s41928-018-0149-2