Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation
Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of mo...
Saved in:
Published in | ETRI journal Vol. 45; no. 2; pp. 346 - 357 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Electronics and Telecommunications Research Institute (ETRI)
01.04.2023
한국전자통신연구원 |
Subjects | |
Online Access | Get full text |
ISSN | 1225-6463 2233-7326 |
DOI | 10.4218/etrij.2021-0455 |
Cover
Abstract | Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware‐based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min‐entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high‐entropy requirements, such as cryptographic key generation for IoT devices. |
---|---|
AbstractList | Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware‐based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min‐entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high‐entropy requirements, such as cryptographic key generation for IoT devices. Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices. KCI Citation Count: 0 |
Author | Kang, Yousung Oh, Mi‐Kyung Lee, Sangjae Choi, Dooho |
Author_xml | – sequence: 1 givenname: Mi‐Kyung orcidid: 0000-0002-5712-8625 surname: Oh fullname: Oh, Mi‐Kyung organization: Electronics and Telecommunications Research Institute – sequence: 2 givenname: Sangjae surname: Lee fullname: Lee, Sangjae organization: Electronics and Telecommunications Research Institute – sequence: 3 givenname: Yousung surname: Kang fullname: Kang, Yousung organization: Electronics and Telecommunications Research Institute – sequence: 4 givenname: Dooho orcidid: 0000-0001-5625-4067 surname: Choi fullname: Choi, Dooho email: doohochoi@korea.ac.kr organization: Korea University Sejong |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002951011$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNqFks-KFDEQxoOs4Ozq2WvOQu8m1Ulv-rgsqw4sCMt4DtVJZSYzPZ0h3bqMJx_BZ_RJ7D96EcRTQfH9vlTVl0t20aWOGHsrxbUCaW5oyHF_DQJkIZTWL9gKoCyL2xKqC7aSALqoVFW-Ypd9vxcCRpFZsbw-nlo6UjfgEFPHsfPc7TCjGyjHb0szBR5a7Hc_v_9osCfPR4F_xky8J_clx-HMTzke4xC_Us9Dytzl82lI24ynXXT8QGe-pY7ybPeavQzY9vTmd71in98_bO4_Fo-fPqzv7x4Lp0oBhSrrWyiDDoQgpEIpRF2jwCY4wKZRWrrgTO2F1qZphKm0riGAqEytS6NUecXeLb5dDvbgok0Y57pN9pDt3dNmbeV4rkrKSbxexD7h3k7bYD7PxNxIeWsxD9G1ZMn4cUCha0VGVR7Qm1ALJbzRwkOjRy-9eLmc-j5TsC4u5x0yxnZ81E6J2TkxOyVmp8RG7uYv7s8c_yaqhXiOLZ3_J7cPmyeQoMd_8QsokK7T |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3400624 crossref_primary_10_3390_s24134163 |
Cites_doi | 10.1109/JIOT.2020.3015382 10.1109/DATE.2012.6176696 10.1109/FiCloud.2016.22 10.1145/2899007.2899013 10.1109/JIOT.2017.2694844 10.1109/TIFS.2016.2524666 10.1109/TCE.2019.2926192 10.4218/etrij.2019-0081 10.1109/ICSENS.2018.8589608 10.1109/JPROC.2014.2320516 10.1007/978-3-642-21040-2_12 10.1007/978-1-4419-8080-9_4 10.1007/978-3-662-48324-4_26 10.6028/NIST.SP.800-90B 10.1109/MDT.2010.25 10.1109/TNANO.2015.2397956 10.1109/ReConFig.2010.24 10.1109/JPROC.2003.811702 10.1109/ACCESS.2017.2713835 10.1109/JSEN.2020.3028872 10.1109/ISMVL.2018.00010 10.1109/HST.2010.5513108 10.1109/SoutheastCon42311.2019.9020567 10.1109/CICC.2017.7993610 10.1109/TDSC.2018.2822298 10.1109/TIFS.2020.2976623 10.1109/TC.2007.250627 |
ContentType | Journal Article |
Copyright | 1225‐6463/$ © 2022 ETRI |
Copyright_xml | – notice: 1225‐6463/$ © 2022 ETRI |
DBID | AAYXX CITATION DOA ACYCR |
DOI | 10.4218/etrij.2021-0455 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals Korean Citation Index |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2233-7326 |
EndPage | 357 |
ExternalDocumentID | oai_kci_go_kr_ARTI_10216114 oai_doaj_org_article_e8d4300594e846d2ad8f9040d850d2b5 10_4218_etrij_2021_0455 ETR212522 |
Genre | article |
GrantInformation_xml | – fundername: Korean government (MSIT) funderid: 2018‐0‐00230 – fundername: National Research Foundation of Korea (NRF) – fundername: Ministry of Science and ICT, Republic of Korea funderid: 2020M3C1C1A01084523 |
GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAYXX ADMLS CITATION OVT AAMMB AEFGJ AGXDD AIDQK AIDYY |
ID | FETCH-LOGICAL-c4302-439723f5fea2014a10099a0abfc2abb451cfc89d0558bb0865592f20689538443 |
IEDL.DBID | DOA |
ISSN | 1225-6463 |
IngestDate | Fri May 31 03:51:20 EDT 2024 Wed Aug 27 01:31:16 EDT 2025 Tue Jul 01 02:03:20 EDT 2025 Thu Apr 24 22:53:59 EDT 2025 Wed Jan 22 16:21:51 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c4302-439723f5fea2014a10099a0abfc2abb451cfc89d0558bb0865592f20689538443 |
Notes | Funding information This research was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2018‐0‐00230, [TrusThingz Project]). This research was supported by the Unmanned Vehicles Core Technology Research and Development Program through the National Research Foundation of Korea (NRF) and the Unmanned Vehicle Advanced Research Center (UVARC) funded by the Ministry of Science and ICT, Republic of Korea (No. 2020M3C1C1A01084523) https://doi.org/10.4218/etrij.2021-0455 |
ORCID | 0000-0001-5625-4067 0000-0002-5712-8625 |
OpenAccessLink | https://doaj.org/article/e8d4300594e846d2ad8f9040d850d2b5 |
PageCount | 12 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_10216114 doaj_primary_oai_doaj_org_article_e8d4300594e846d2ad8f9040d850d2b5 crossref_citationtrail_10_4218_etrij_2021_0455 crossref_primary_10_4218_etrij_2021_0455 wiley_primary_10_4218_etrij_2021_0455_ETR212522 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | April 2023 2023-04-00 2023-04-01 2023-04 |
PublicationDateYYYYMMDD | 2023-04-01 |
PublicationDate_xml | – month: 04 year: 2023 text: April 2023 |
PublicationDecade | 2020 |
PublicationTitle | ETRI journal |
PublicationYear | 2023 |
Publisher | Electronics and Telecommunications Research Institute (ETRI) 한국전자통신연구원 |
Publisher_xml | – name: Electronics and Telecommunications Research Institute (ETRI) – name: 한국전자통신연구원 |
References | 2017; 5 2021; 8 2015; 14 2021; 21 2017; 4 2012 2011 2010 2019; 16 2020; 15 2007; 56 2016; 11 2010; 27 2003; 91 2001 2019; 42 2019; 65 2015; 9290 2020 2019 2018 2017 2016 2015 2014; 102 e_1_2_8_28_1 e_1_2_8_29_1 e_1_2_8_24_1 e_1_2_8_25_1 e_1_2_8_26_1 e_1_2_8_27_1 Jia S. (e_1_2_8_23_1) 2015 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_5_1 e_1_2_8_4_1 e_1_2_8_7_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_20_1 e_1_2_8_21_1 e_1_2_8_22_1 e_1_2_8_17_1 e_1_2_8_18_1 e_1_2_8_19_1 e_1_2_8_13_1 e_1_2_8_14_1 e_1_2_8_35_1 e_1_2_8_15_1 e_1_2_8_16_1 e_1_2_8_32_1 e_1_2_8_10_1 e_1_2_8_31_1 e_1_2_8_11_1 e_1_2_8_34_1 e_1_2_8_12_1 e_1_2_8_33_1 e_1_2_8_30_1 |
References_xml | – start-page: 94 year: 2010 end-page: 99 – volume: 91 start-page: 489 issue: 4 year: 2003 end-page: 502 article-title: Introduction to Flash memory publication-title: Proc. IEEE – volume: 11 start-page: 2191 issue: 6 year: 2016 end-page: 1305 article-title: Design, evaluation, and optimization of physical unclonable functions based on transient effect ring oscillators publication-title: IEEE Trans. Inf. Forensics Security – volume: 8 start-page: 6406 issue: 8 year: 2021 end-page: 6415 article-title: Enabling drones in the internet of things with decentralized blockchain‐based security publication-title: IEEE Int. Things J. – start-page: 99 year: 2016 end-page: 106 – volume: 27 start-page: 48 issue: 1 year: 2010 end-page: 65 article-title: Secure and robust error correction for physical unclonable functions publication-title: IEEE Design Test Comput. – volume: 21 start-page: 5487 issue: 4 year: 2021 end-page: 5501 article-title: A provably secure and practicle PUF‐based end‐to‐end mutual authentication and key exchange protocol for IoT publication-title: IEEE Sensors J. – volume: 42 start-page: 205 issue: 2 year: 2019 end-page: 216 article-title: Design and implementation of an improved MA‐APUF with higer uniqueness and security publication-title: ETRI J. – volume: 65 start-page: 388 issue: 3 year: 2019 end-page: 397 article-title: PMsec: Physical unclonable function‐based robust and lightweight authentication in the Internet of Medical Things publication-title: IEEE Trans. Consum. Electron. – start-page: 1 year: 2015 end-page: 6 – volume: 56 start-page: 109 issue: 1 year: 2007 end-page: 119 article-title: A provably secure true random number generator with built‐in tolerance to active attacks publication-title: IEEE Trans. Computers – start-page: 7 year: 2018 end-page: 12 – start-page: 10 year: 2016 end-page: 13 – year: 2001 – start-page: 1 year: 2019 end-page: 6 – start-page: 1 year: 2012 end-page: 14 – start-page: 517 year: 2015 end-page: 534 – year: 2016 – volume: 5 start-page: 11909 issue: 2 year: 2017 end-page: 11926 article-title: Securing systems with indispensable entropy: LWE‐based lossless computational fuzzy extractor for the Internet of Things publication-title: IEEE Access – year: 2018 – volume: 15 start-page: 2798 year: 2020 end-page: 2807 article-title: Highly independent MTJ‐based PUF system using diode‐connected transistor and two‐step postprocessing for improved response stability publication-title: IEEE Trans. Inf. Forensics Security – start-page: 1 year: 2017 end-page: 4 – start-page: 65 year: 2012 end-page: 102 – year: 2020 – volume: 4 start-page: 1250 issue: 5 year: 2017 end-page: 1258 article-title: A survey on security and privacy issues in Internet of Things publication-title: IEEE Int. Things J. – start-page: 98 year: 2017 end-page: 103 – volume: 102 start-page: 1126 issue: 8 year: 2014 end-page: 1141 article-title: Physical unclonable functions and applications: A tutorial publication-title: Proc. IEEE – volume: 16 start-page: 462 issue: 3 year: 2019 end-page: 475 article-title: Decay‐based DRAM PUFs in commodity devices publication-title: IEEE Trans. Dependable and Secure Compt. – volume: 9290 year: 2015 – year: 2019 – start-page: 175 year: 2011 end-page: 190 – volume: 14 start-page: 384 issue: 2 year: 2015 end-page: 389 article-title: Investigation of physically unclonable functions using flash memory for integrated circuit authentication publication-title: IEEE Trans. Nanotechnology – start-page: 298 year: 2010 end-page: 303 – ident: e_1_2_8_4_1 doi: 10.1109/JIOT.2020.3015382 – ident: e_1_2_8_18_1 doi: 10.1109/DATE.2012.6176696 – ident: e_1_2_8_8_1 doi: 10.1109/FiCloud.2016.22 – ident: e_1_2_8_7_1 doi: 10.1145/2899007.2899013 – ident: e_1_2_8_6_1 doi: 10.1109/JIOT.2017.2694844 – ident: e_1_2_8_15_1 doi: 10.1109/TIFS.2016.2524666 – ident: e_1_2_8_3_1 doi: 10.1109/TCE.2019.2926192 – ident: e_1_2_8_17_1 doi: 10.4218/etrij.2019-0081 – ident: e_1_2_8_33_1 – ident: e_1_2_8_22_1 doi: 10.1109/ICSENS.2018.8589608 – ident: e_1_2_8_12_1 doi: 10.1109/JPROC.2014.2320516 – ident: e_1_2_8_28_1 – ident: e_1_2_8_31_1 doi: 10.1007/978-3-642-21040-2_12 – ident: e_1_2_8_32_1 – ident: e_1_2_8_11_1 doi: 10.1007/978-1-4419-8080-9_4 – ident: e_1_2_8_29_1 doi: 10.1007/978-3-662-48324-4_26 – ident: e_1_2_8_25_1 doi: 10.6028/NIST.SP.800-90B – ident: e_1_2_8_13_1 doi: 10.1109/MDT.2010.25 – ident: e_1_2_8_24_1 doi: 10.1109/TNANO.2015.2397956 – ident: e_1_2_8_16_1 doi: 10.1109/ReConFig.2010.24 – ident: e_1_2_8_27_1 doi: 10.1109/JPROC.2003.811702 – ident: e_1_2_8_5_1 doi: 10.1109/ACCESS.2017.2713835 – ident: e_1_2_8_2_1 doi: 10.1109/JSEN.2020.3028872 – ident: e_1_2_8_30_1 doi: 10.1109/ISMVL.2018.00010 – ident: e_1_2_8_35_1 – ident: e_1_2_8_14_1 doi: 10.1109/HST.2010.5513108 – ident: e_1_2_8_20_1 doi: 10.1109/SoutheastCon42311.2019.9020567 – ident: e_1_2_8_19_1 doi: 10.1109/CICC.2017.7993610 – volume-title: Information Security, ISC 2015 year: 2015 ident: e_1_2_8_23_1 – ident: e_1_2_8_9_1 – ident: e_1_2_8_21_1 doi: 10.1109/TDSC.2018.2822298 – ident: e_1_2_8_10_1 doi: 10.1109/TIFS.2020.2976623 – ident: e_1_2_8_26_1 doi: 10.1109/TC.2007.250627 – ident: e_1_2_8_34_1 |
SSID | ssj0020458 |
Score | 2.3240843 |
Snippet | Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific... Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific... |
SourceID | nrf doaj crossref wiley |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 346 |
SubjectTerms | cryptographic key entropy flash memory hardware security primitive physical unclonable function (PUF) 전자/정보통신공학 |
Title | Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation |
URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.2021-0455 https://doaj.org/article/e8d4300594e846d2ad8f9040d850d2b5 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002951011 |
Volume | 45 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | ETRI Journal, 2023, 45(2), , pp.346-357 |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF7Ekx7EJ9YXC3rwEpukm232qGKpgh6khd6WfdZaTUusiP_emU1a6kF68RQIu8kyM9mZj-x8HyEXKnYW4L-IBGvbiCUqjZRisBlCdZyK3PBWoNh4fOLdPnsYZIMlqS88E1bRA1eGa7rcslZgFXGQKm2qbO4FRJ7Ns9imOrCXwsvmYKqGWvj7D6EWRGvEGW9VpD4M8lkThapeARimAKMZdvgt5aNA2w9Zpij972I1ZJvONtmqy0R6XS1vh6y5YpdsLpEH7pFpIPZ9r3uHCqoKS82CfrnqrqQTTz3Uxy8RZitLscXqS5WOftSydXSKsl645X1QKF-pKb-ns4rFemQofOB0GHip8WH7pN-56912o1o_ITJgMmyGQkkxn3mnIM0zlWA5qGKlvUmV1ixLjDe5sHGW5VrH2KIqUp_GPBewDTLWOiDrxaRwh4RawRPfZtopJcCcJjdatUUM7k-cY5w3yNXcitLU5OKocfEmAWSg2WUwu0SzSzR7g1wuJkwrXo2_h96gWxbDkBA73IAwkXWYyFVh0iDn4FQ5NqMwH6_DiRyXEmDDvUR9cw7IsEGawemrliTves-Q86F2PfqPxR2TDVSxrw4EnZD1WfnpTqHWmemzENY_-hT41A |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9RADLZge4AeEE-xPEeCA5fQZDKZzRwLarWFtge0iyouo3kuS2l2lS5C3PgJ_EZ-CfYkRC0SQpwiRTNWZI_tz0n8GeC5yYPH8l9lSkx8JgrDM2MEBkNEx1zVTpaJYuPoWE7n4s1JdXKhF6bjhxheuJFnpHhNDk4vpMnLBaYlsuKmXX7CCo9jPSyq6ipsEbbhI9jafT__MB_KLvoUSGUXntxMCll2BD8kZOcPEZdyU6Lwx4zTtPEycE2ZZ_8m3OghI9vtbHwLroTmNmxfIBK8A20i-T3r-4gaZhrP3EDF3HVaslVkEbHyx5_ff1Du8owarr6aNrDzfogdW9OQLwqA5wzBLHPtt_Wm47ReOobuzhaJpZrE3YX5_t7s9TTrpylkTpQ5tUbRgLFYxWAw6QtTEDg0ubHRcWOtqAoXXa18XlW1tTk1rCoeeS5rhUFRiPIejJpVE-4D80oWcSJsMEahQl3trJmoHA9DEYKQcgwvf-tRu55qnCZefNZYcpDidVK8JsVrUvwYXgwb1h3Lxt-XviLDDMuIHjvdWLUL3XubDrUXZaKiCYivPDe-jgrDla-r3HOLQp6hWfWpW6b9dF2s9GmrsYg40DTtXGKdOIadZPZ_PZLem71DBIBI9sF_73gK16azo0N9eHD89iFcp2H23X9Bj2C0ab-Exwh5NvZJf6Z_ARKT-8Y |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS9xAFB6sgrQP4qXF9VIH2gdfUnOZzGYerbp4qVLEFenLMNd1tWaXuKX41p_Q3-gv8ZxJDCoU6VMgZIZwrt9J5nyHkM8qdhbKfxEJ1rURS1QaKcUgGAI6TkVheBYoNo5P-H6fHV7kj6cJsRem5odoP7ihZ4R4jQ4-th6dnEFWQiVOquEVFHgplMMsz9-QGeTKA1Of2T7v_-i3VRf-CcSqCww34oxnNb8PbrL1YotnqSkw-EPCKSv_HLeGxNObJ3MNYqTbtYoXyJQrF8m7JzyCS6QKHL83TRtRSVVpqWmZmOtGSzry1ANUvrz_8xdTl6XYb_VbVY7eNjPs6BhnfGH8u6WAZamp7saTmtJ6aCh4Ox0Ekmrc7j3p9_bOdvajZphCZFgWY2cUzhfzuXcKcj5TCWJDFSvtTaq0ZnlivCmEjfO80DrGflWR-jTmhYCYyFj2gUyXo9ItE2oFT3yXaaeUAIGawmjVFTHYQuIc47xDvjzKUZqGaRwHXvyUUHGg4GUQvETBSxR8h2y2C8Y1yca_H_2KimkfQ3bscGNUDWTjbNIVlmWBicYBvLKpsoUXEK1skcc21bDJJ1CrvDbDsB6vg5G8riTUEAcSh51zKBM7ZCuo_bVXkntnpwAAAMiu_PeKDTL7fbcnvx2cHK2StzjKvj4VtEamJ9Uvtw6AZ6I_Nib9AIYu-u8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Implementation+and+characterization+of+flash%E2%80%90based+hardware+security+primitives+for+cryptographic+key+generation&rft.jtitle=ETRI+journal&rft.au=Oh%2C+Mi%E2%80%90Kyung&rft.au=Lee%2C+Sangjae&rft.au=Kang%2C+Yousung&rft.au=Choi%2C+Dooho&rft.date=2023-04-01&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=45&rft.issue=2&rft.spage=346&rft.epage=357&rft_id=info:doi/10.4218%2Fetrij.2021-0455&rft.externalDBID=10.4218%252Fetrij.2021-0455&rft.externalDocID=ETR212522 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |