Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation

Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of mo...

Full description

Saved in:
Bibliographic Details
Published inETRI journal Vol. 45; no. 2; pp. 346 - 357
Main Authors Oh, Mi‐Kyung, Lee, Sangjae, Kang, Yousung, Choi, Dooho
Format Journal Article
LanguageEnglish
Published Electronics and Telecommunications Research Institute (ETRI) 01.04.2023
한국전자통신연구원
Subjects
Online AccessGet full text
ISSN1225-6463
2233-7326
DOI10.4218/etrij.2021-0455

Cover

Abstract Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware‐based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min‐entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high‐entropy requirements, such as cryptographic key generation for IoT devices.
AbstractList Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware‐based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min‐entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high‐entropy requirements, such as cryptographic key generation for IoT devices.
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices. KCI Citation Count: 0
Author Kang, Yousung
Oh, Mi‐Kyung
Lee, Sangjae
Choi, Dooho
Author_xml – sequence: 1
  givenname: Mi‐Kyung
  orcidid: 0000-0002-5712-8625
  surname: Oh
  fullname: Oh, Mi‐Kyung
  organization: Electronics and Telecommunications Research Institute
– sequence: 2
  givenname: Sangjae
  surname: Lee
  fullname: Lee, Sangjae
  organization: Electronics and Telecommunications Research Institute
– sequence: 3
  givenname: Yousung
  surname: Kang
  fullname: Kang, Yousung
  organization: Electronics and Telecommunications Research Institute
– sequence: 4
  givenname: Dooho
  orcidid: 0000-0001-5625-4067
  surname: Choi
  fullname: Choi, Dooho
  email: doohochoi@korea.ac.kr
  organization: Korea University Sejong
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002951011$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqFks-KFDEQxoOs4Ozq2WvOQu8m1Ulv-rgsqw4sCMt4DtVJZSYzPZ0h3bqMJx_BZ_RJ7D96EcRTQfH9vlTVl0t20aWOGHsrxbUCaW5oyHF_DQJkIZTWL9gKoCyL2xKqC7aSALqoVFW-Ypd9vxcCRpFZsbw-nlo6UjfgEFPHsfPc7TCjGyjHb0szBR5a7Hc_v_9osCfPR4F_xky8J_clx-HMTzke4xC_Us9Dytzl82lI24ynXXT8QGe-pY7ybPeavQzY9vTmd71in98_bO4_Fo-fPqzv7x4Lp0oBhSrrWyiDDoQgpEIpRF2jwCY4wKZRWrrgTO2F1qZphKm0riGAqEytS6NUecXeLb5dDvbgok0Y57pN9pDt3dNmbeV4rkrKSbxexD7h3k7bYD7PxNxIeWsxD9G1ZMn4cUCha0VGVR7Qm1ALJbzRwkOjRy-9eLmc-j5TsC4u5x0yxnZ81E6J2TkxOyVmp8RG7uYv7s8c_yaqhXiOLZ3_J7cPmyeQoMd_8QsokK7T
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3400624
crossref_primary_10_3390_s24134163
Cites_doi 10.1109/JIOT.2020.3015382
10.1109/DATE.2012.6176696
10.1109/FiCloud.2016.22
10.1145/2899007.2899013
10.1109/JIOT.2017.2694844
10.1109/TIFS.2016.2524666
10.1109/TCE.2019.2926192
10.4218/etrij.2019-0081
10.1109/ICSENS.2018.8589608
10.1109/JPROC.2014.2320516
10.1007/978-3-642-21040-2_12
10.1007/978-1-4419-8080-9_4
10.1007/978-3-662-48324-4_26
10.6028/NIST.SP.800-90B
10.1109/MDT.2010.25
10.1109/TNANO.2015.2397956
10.1109/ReConFig.2010.24
10.1109/JPROC.2003.811702
10.1109/ACCESS.2017.2713835
10.1109/JSEN.2020.3028872
10.1109/ISMVL.2018.00010
10.1109/HST.2010.5513108
10.1109/SoutheastCon42311.2019.9020567
10.1109/CICC.2017.7993610
10.1109/TDSC.2018.2822298
10.1109/TIFS.2020.2976623
10.1109/TC.2007.250627
ContentType Journal Article
Copyright 1225‐6463/$ © 2022 ETRI
Copyright_xml – notice: 1225‐6463/$ © 2022 ETRI
DBID AAYXX
CITATION
DOA
ACYCR
DOI 10.4218/etrij.2021-0455
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList CrossRef



Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 357
ExternalDocumentID oai_kci_go_kr_ARTI_10216114
oai_doaj_org_article_e8d4300594e846d2ad8f9040d850d2b5
10_4218_etrij_2021_0455
ETR212522
Genre article
GrantInformation_xml – fundername: Korean government (MSIT)
  funderid: 2018‐0‐00230
– fundername: National Research Foundation of Korea (NRF)
– fundername: Ministry of Science and ICT, Republic of Korea
  funderid: 2020M3C1C1A01084523
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAYXX
ADMLS
CITATION
OVT
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
ID FETCH-LOGICAL-c4302-439723f5fea2014a10099a0abfc2abb451cfc89d0558bb0865592f20689538443
IEDL.DBID DOA
ISSN 1225-6463
IngestDate Fri May 31 03:51:20 EDT 2024
Wed Aug 27 01:31:16 EDT 2025
Tue Jul 01 02:03:20 EDT 2025
Thu Apr 24 22:53:59 EDT 2025
Wed Jan 22 16:21:51 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4302-439723f5fea2014a10099a0abfc2abb451cfc89d0558bb0865592f20689538443
Notes Funding information
This research was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2018‐0‐00230, [TrusThingz Project]). This research was supported by the Unmanned Vehicles Core Technology Research and Development Program through the National Research Foundation of Korea (NRF) and the Unmanned Vehicle Advanced Research Center (UVARC) funded by the Ministry of Science and ICT, Republic of Korea (No. 2020M3C1C1A01084523)
https://doi.org/10.4218/etrij.2021-0455
ORCID 0000-0001-5625-4067
0000-0002-5712-8625
OpenAccessLink https://doaj.org/article/e8d4300594e846d2ad8f9040d850d2b5
PageCount 12
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_10216114
doaj_primary_oai_doaj_org_article_e8d4300594e846d2ad8f9040d850d2b5
crossref_citationtrail_10_4218_etrij_2021_0455
crossref_primary_10_4218_etrij_2021_0455
wiley_primary_10_4218_etrij_2021_0455_ETR212522
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate April 2023
2023-04-00
2023-04-01
2023-04
PublicationDateYYYYMMDD 2023-04-01
PublicationDate_xml – month: 04
  year: 2023
  text: April 2023
PublicationDecade 2020
PublicationTitle ETRI journal
PublicationYear 2023
Publisher Electronics and Telecommunications Research Institute (ETRI)
한국전자통신연구원
Publisher_xml – name: Electronics and Telecommunications Research Institute (ETRI)
– name: 한국전자통신연구원
References 2017; 5
2021; 8
2015; 14
2021; 21
2017; 4
2012
2011
2010
2019; 16
2020; 15
2007; 56
2016; 11
2010; 27
2003; 91
2001
2019; 42
2019; 65
2015; 9290
2020
2019
2018
2017
2016
2015
2014; 102
e_1_2_8_28_1
e_1_2_8_29_1
e_1_2_8_24_1
e_1_2_8_25_1
e_1_2_8_26_1
e_1_2_8_27_1
Jia S. (e_1_2_8_23_1) 2015
e_1_2_8_3_1
e_1_2_8_2_1
e_1_2_8_5_1
e_1_2_8_4_1
e_1_2_8_7_1
e_1_2_8_6_1
e_1_2_8_9_1
e_1_2_8_8_1
e_1_2_8_20_1
e_1_2_8_21_1
e_1_2_8_22_1
e_1_2_8_17_1
e_1_2_8_18_1
e_1_2_8_19_1
e_1_2_8_13_1
e_1_2_8_14_1
e_1_2_8_35_1
e_1_2_8_15_1
e_1_2_8_16_1
e_1_2_8_32_1
e_1_2_8_10_1
e_1_2_8_31_1
e_1_2_8_11_1
e_1_2_8_34_1
e_1_2_8_12_1
e_1_2_8_33_1
e_1_2_8_30_1
References_xml – start-page: 94
  year: 2010
  end-page: 99
– volume: 91
  start-page: 489
  issue: 4
  year: 2003
  end-page: 502
  article-title: Introduction to Flash memory
  publication-title: Proc. IEEE
– volume: 11
  start-page: 2191
  issue: 6
  year: 2016
  end-page: 1305
  article-title: Design, evaluation, and optimization of physical unclonable functions based on transient effect ring oscillators
  publication-title: IEEE Trans. Inf. Forensics Security
– volume: 8
  start-page: 6406
  issue: 8
  year: 2021
  end-page: 6415
  article-title: Enabling drones in the internet of things with decentralized blockchain‐based security
  publication-title: IEEE Int. Things J.
– start-page: 99
  year: 2016
  end-page: 106
– volume: 27
  start-page: 48
  issue: 1
  year: 2010
  end-page: 65
  article-title: Secure and robust error correction for physical unclonable functions
  publication-title: IEEE Design Test Comput.
– volume: 21
  start-page: 5487
  issue: 4
  year: 2021
  end-page: 5501
  article-title: A provably secure and practicle PUF‐based end‐to‐end mutual authentication and key exchange protocol for IoT
  publication-title: IEEE Sensors J.
– volume: 42
  start-page: 205
  issue: 2
  year: 2019
  end-page: 216
  article-title: Design and implementation of an improved MA‐APUF with higer uniqueness and security
  publication-title: ETRI J.
– volume: 65
  start-page: 388
  issue: 3
  year: 2019
  end-page: 397
  article-title: PMsec: Physical unclonable function‐based robust and lightweight authentication in the Internet of Medical Things
  publication-title: IEEE Trans. Consum. Electron.
– start-page: 1
  year: 2015
  end-page: 6
– volume: 56
  start-page: 109
  issue: 1
  year: 2007
  end-page: 119
  article-title: A provably secure true random number generator with built‐in tolerance to active attacks
  publication-title: IEEE Trans. Computers
– start-page: 7
  year: 2018
  end-page: 12
– start-page: 10
  year: 2016
  end-page: 13
– year: 2001
– start-page: 1
  year: 2019
  end-page: 6
– start-page: 1
  year: 2012
  end-page: 14
– start-page: 517
  year: 2015
  end-page: 534
– year: 2016
– volume: 5
  start-page: 11909
  issue: 2
  year: 2017
  end-page: 11926
  article-title: Securing systems with indispensable entropy: LWE‐based lossless computational fuzzy extractor for the Internet of Things
  publication-title: IEEE Access
– year: 2018
– volume: 15
  start-page: 2798
  year: 2020
  end-page: 2807
  article-title: Highly independent MTJ‐based PUF system using diode‐connected transistor and two‐step postprocessing for improved response stability
  publication-title: IEEE Trans. Inf. Forensics Security
– start-page: 1
  year: 2017
  end-page: 4
– start-page: 65
  year: 2012
  end-page: 102
– year: 2020
– volume: 4
  start-page: 1250
  issue: 5
  year: 2017
  end-page: 1258
  article-title: A survey on security and privacy issues in Internet of Things
  publication-title: IEEE Int. Things J.
– start-page: 98
  year: 2017
  end-page: 103
– volume: 102
  start-page: 1126
  issue: 8
  year: 2014
  end-page: 1141
  article-title: Physical unclonable functions and applications: A tutorial
  publication-title: Proc. IEEE
– volume: 16
  start-page: 462
  issue: 3
  year: 2019
  end-page: 475
  article-title: Decay‐based DRAM PUFs in commodity devices
  publication-title: IEEE Trans. Dependable and Secure Compt.
– volume: 9290
  year: 2015
– year: 2019
– start-page: 175
  year: 2011
  end-page: 190
– volume: 14
  start-page: 384
  issue: 2
  year: 2015
  end-page: 389
  article-title: Investigation of physically unclonable functions using flash memory for integrated circuit authentication
  publication-title: IEEE Trans. Nanotechnology
– start-page: 298
  year: 2010
  end-page: 303
– ident: e_1_2_8_4_1
  doi: 10.1109/JIOT.2020.3015382
– ident: e_1_2_8_18_1
  doi: 10.1109/DATE.2012.6176696
– ident: e_1_2_8_8_1
  doi: 10.1109/FiCloud.2016.22
– ident: e_1_2_8_7_1
  doi: 10.1145/2899007.2899013
– ident: e_1_2_8_6_1
  doi: 10.1109/JIOT.2017.2694844
– ident: e_1_2_8_15_1
  doi: 10.1109/TIFS.2016.2524666
– ident: e_1_2_8_3_1
  doi: 10.1109/TCE.2019.2926192
– ident: e_1_2_8_17_1
  doi: 10.4218/etrij.2019-0081
– ident: e_1_2_8_33_1
– ident: e_1_2_8_22_1
  doi: 10.1109/ICSENS.2018.8589608
– ident: e_1_2_8_12_1
  doi: 10.1109/JPROC.2014.2320516
– ident: e_1_2_8_28_1
– ident: e_1_2_8_31_1
  doi: 10.1007/978-3-642-21040-2_12
– ident: e_1_2_8_32_1
– ident: e_1_2_8_11_1
  doi: 10.1007/978-1-4419-8080-9_4
– ident: e_1_2_8_29_1
  doi: 10.1007/978-3-662-48324-4_26
– ident: e_1_2_8_25_1
  doi: 10.6028/NIST.SP.800-90B
– ident: e_1_2_8_13_1
  doi: 10.1109/MDT.2010.25
– ident: e_1_2_8_24_1
  doi: 10.1109/TNANO.2015.2397956
– ident: e_1_2_8_16_1
  doi: 10.1109/ReConFig.2010.24
– ident: e_1_2_8_27_1
  doi: 10.1109/JPROC.2003.811702
– ident: e_1_2_8_5_1
  doi: 10.1109/ACCESS.2017.2713835
– ident: e_1_2_8_2_1
  doi: 10.1109/JSEN.2020.3028872
– ident: e_1_2_8_30_1
  doi: 10.1109/ISMVL.2018.00010
– ident: e_1_2_8_35_1
– ident: e_1_2_8_14_1
  doi: 10.1109/HST.2010.5513108
– ident: e_1_2_8_20_1
  doi: 10.1109/SoutheastCon42311.2019.9020567
– ident: e_1_2_8_19_1
  doi: 10.1109/CICC.2017.7993610
– volume-title: Information Security, ISC 2015
  year: 2015
  ident: e_1_2_8_23_1
– ident: e_1_2_8_9_1
– ident: e_1_2_8_21_1
  doi: 10.1109/TDSC.2018.2822298
– ident: e_1_2_8_10_1
  doi: 10.1109/TIFS.2020.2976623
– ident: e_1_2_8_26_1
  doi: 10.1109/TC.2007.250627
– ident: e_1_2_8_34_1
SSID ssj0020458
Score 2.3240843
Snippet Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific...
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific...
SourceID nrf
doaj
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 346
SubjectTerms cryptographic key
entropy
flash memory
hardware security primitive
physical unclonable function (PUF)
전자/정보통신공학
Title Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.2021-0455
https://doaj.org/article/e8d4300594e846d2ad8f9040d850d2b5
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002951011
Volume 45
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2023, 45(2), , pp.346-357
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF7Ekx7EJ9YXC3rwEpukm232qGKpgh6khd6WfdZaTUusiP_emU1a6kF68RQIu8kyM9mZj-x8HyEXKnYW4L-IBGvbiCUqjZRisBlCdZyK3PBWoNh4fOLdPnsYZIMlqS88E1bRA1eGa7rcslZgFXGQKm2qbO4FRJ7Ns9imOrCXwsvmYKqGWvj7D6EWRGvEGW9VpD4M8lkThapeARimAKMZdvgt5aNA2w9Zpij972I1ZJvONtmqy0R6XS1vh6y5YpdsLpEH7pFpIPZ9r3uHCqoKS82CfrnqrqQTTz3Uxy8RZitLscXqS5WOftSydXSKsl645X1QKF-pKb-ns4rFemQofOB0GHip8WH7pN-56912o1o_ITJgMmyGQkkxn3mnIM0zlWA5qGKlvUmV1ixLjDe5sHGW5VrH2KIqUp_GPBewDTLWOiDrxaRwh4RawRPfZtopJcCcJjdatUUM7k-cY5w3yNXcitLU5OKocfEmAWSg2WUwu0SzSzR7g1wuJkwrXo2_h96gWxbDkBA73IAwkXWYyFVh0iDn4FQ5NqMwH6_DiRyXEmDDvUR9cw7IsEGawemrliTves-Q86F2PfqPxR2TDVSxrw4EnZD1WfnpTqHWmemzENY_-hT41A
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9RADLZge4AeEE-xPEeCA5fQZDKZzRwLarWFtge0iyouo3kuS2l2lS5C3PgJ_EZ-CfYkRC0SQpwiRTNWZI_tz0n8GeC5yYPH8l9lSkx8JgrDM2MEBkNEx1zVTpaJYuPoWE7n4s1JdXKhF6bjhxheuJFnpHhNDk4vpMnLBaYlsuKmXX7CCo9jPSyq6ipsEbbhI9jafT__MB_KLvoUSGUXntxMCll2BD8kZOcPEZdyU6Lwx4zTtPEycE2ZZ_8m3OghI9vtbHwLroTmNmxfIBK8A20i-T3r-4gaZhrP3EDF3HVaslVkEbHyx5_ff1Du8owarr6aNrDzfogdW9OQLwqA5wzBLHPtt_Wm47ReOobuzhaJpZrE3YX5_t7s9TTrpylkTpQ5tUbRgLFYxWAw6QtTEDg0ubHRcWOtqAoXXa18XlW1tTk1rCoeeS5rhUFRiPIejJpVE-4D80oWcSJsMEahQl3trJmoHA9DEYKQcgwvf-tRu55qnCZefNZYcpDidVK8JsVrUvwYXgwb1h3Lxt-XviLDDMuIHjvdWLUL3XubDrUXZaKiCYivPDe-jgrDla-r3HOLQp6hWfWpW6b9dF2s9GmrsYg40DTtXGKdOIadZPZ_PZLem71DBIBI9sF_73gK16azo0N9eHD89iFcp2H23X9Bj2C0ab-Exwh5NvZJf6Z_ARKT-8Y
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS9xAFB6sgrQP4qXF9VIH2gdfUnOZzGYerbp4qVLEFenLMNd1tWaXuKX41p_Q3-gv8ZxJDCoU6VMgZIZwrt9J5nyHkM8qdhbKfxEJ1rURS1QaKcUgGAI6TkVheBYoNo5P-H6fHV7kj6cJsRem5odoP7ihZ4R4jQ4-th6dnEFWQiVOquEVFHgplMMsz9-QGeTKA1Of2T7v_-i3VRf-CcSqCww34oxnNb8PbrL1YotnqSkw-EPCKSv_HLeGxNObJ3MNYqTbtYoXyJQrF8m7JzyCS6QKHL83TRtRSVVpqWmZmOtGSzry1ANUvrz_8xdTl6XYb_VbVY7eNjPs6BhnfGH8u6WAZamp7saTmtJ6aCh4Ox0Ekmrc7j3p9_bOdvajZphCZFgWY2cUzhfzuXcKcj5TCWJDFSvtTaq0ZnlivCmEjfO80DrGflWR-jTmhYCYyFj2gUyXo9ItE2oFT3yXaaeUAIGawmjVFTHYQuIc47xDvjzKUZqGaRwHXvyUUHGg4GUQvETBSxR8h2y2C8Y1yca_H_2KimkfQ3bscGNUDWTjbNIVlmWBicYBvLKpsoUXEK1skcc21bDJJ1CrvDbDsB6vg5G8riTUEAcSh51zKBM7ZCuo_bVXkntnpwAAAMiu_PeKDTL7fbcnvx2cHK2StzjKvj4VtEamJ9Uvtw6AZ6I_Nib9AIYu-u8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Implementation+and+characterization+of+flash%E2%80%90based+hardware+security+primitives+for+cryptographic+key+generation&rft.jtitle=ETRI+journal&rft.au=Oh%2C+Mi%E2%80%90Kyung&rft.au=Lee%2C+Sangjae&rft.au=Kang%2C+Yousung&rft.au=Choi%2C+Dooho&rft.date=2023-04-01&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=45&rft.issue=2&rft.spage=346&rft.epage=357&rft_id=info:doi/10.4218%2Fetrij.2021-0455&rft.externalDBID=10.4218%252Fetrij.2021-0455&rft.externalDocID=ETR212522
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon