Memristive fingerprints prove key destruction

The physical fingerprinting of a memristor crossbar array can be used to prove whether a digital key stored in the array is securely destroyed.

Access options

Rent or Buy article

Get time limited or full article access on ReadCube.


All prices are NET prices.

Fig. 1: Provable key destruction using memristor crossbar array fingerprints.


  1. 1.

    Rührmair, U. & van Dijk, M. 2013 IEEE Symposium on Security and Privacy https://doi.org/10.1109/SP.2013.27 (2013).

  2. 2.

    Jiang, H. et al. Nat. Electron. https://doi.org/10.1038/s41928-018-0146-5 (2018).

  3. 3.

    Strukov, D. B., Snider, G. S., Stewart, D. R. & Williams, R. S. Nature 453, 80–83 (2008).

    Article  Google Scholar 

  4. 4.

    Zhang, R. et al. Nanoscale 10, 2721–2726 (2018).

    Article  Google Scholar 

  5. 5.

    Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. IEEE Access 4, 61–80 (2016).

    Article  Google Scholar 

  6. 6.

    Rührmair, U. et al. in Cryptographic Hardware and Embedded Systems — CHES 2014 (eds Batina, L. & Robshaw, M.) 476–492 (Springer-Verlag, Berlin, 2014).

Download references

Author information



Corresponding authors

Correspondence to Wenjie Xiong or Jakub Szefer.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Xiong, W., Szefer, J. Memristive fingerprints prove key destruction. Nat Electron 1, 527–528 (2018). https://doi.org/10.1038/s41928-018-0149-2

Download citation

Further reading


Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing