{"id":"https://openalex.org/W2781952823","doi":"https://doi.org/10.1109/test.2017.8242026","title":"Security keynote: Ultra-low-energy security circuit primitives for IoT platforms","display_name":"Security keynote: Ultra-low-energy security circuit primitives for IoT platforms","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2781952823","doi":"https://doi.org/10.1109/test.2017.8242026","mag":"2781952823"},"language":"en","primary_location":{"id":"doi:10.1109/test.2017.8242026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2017.8242026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Test Conference (ITC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039276616","display_name":"Sanu Mathew","orcid":"https://orcid.org/0000-0003-1344-7533"},"institutions":[{"id":"https://openalex.org/I4210158342","display_name":"Intel (United Kingdom)","ror":"https://ror.org/058cxws58","country_code":"GB","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210158342"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Sanu Mathew","raw_affiliation_strings":["Intel Corporation"],"affiliations":[{"raw_affiliation_string":"Intel Corporation","institution_ids":["https://openalex.org/I4210158342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039276616"],"corresponding_institution_ids":["https://openalex.org/I4210158342"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20502441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10363","display_name":"Low-power high-performance VLSI design","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7625280618667603},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.560050368309021},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5470463037490845},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5333027839660645},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5201057195663452},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5121011734008789},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4545445144176483},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.444904625415802},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4407113790512085},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4246056079864502},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.4229784607887268},{"id":"https://openalex.org/keywords/testability","display_name":"Testability","score":0.42223823070526123},{"id":"https://openalex.org/keywords/digital-electronics","display_name":"Digital electronics","score":0.4218243956565857},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39757609367370605},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.32839125394821167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27350255846977234},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1985802948474884},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11774855852127075},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.09505364298820496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7625280618667603},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.560050368309021},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5470463037490845},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5333027839660645},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5201057195663452},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5121011734008789},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4545445144176483},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.444904625415802},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4407113790512085},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4246056079864502},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.4229784607887268},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.42223823070526123},{"id":"https://openalex.org/C81843906","wikidata":"https://www.wikidata.org/wiki/Q173156","display_name":"Digital electronics","level":3,"score":0.4218243956565857},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39757609367370605},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.32839125394821167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27350255846977234},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1985802948474884},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11774855852127075},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.09505364298820496}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/test.2017.8242026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2017.8242026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Test Conference (ITC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.8899999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4253685677","https://openalex.org/W2029006445","https://openalex.org/W4255075415","https://openalex.org/W2580249689","https://openalex.org/W2969678054","https://openalex.org/W2769734684","https://openalex.org/W2022533428","https://openalex.org/W2103519941","https://openalex.org/W2903787673","https://openalex.org/W2777343049"],"abstract_inverted_index":{"Low-area":[0],"energy-efficient":[1,32],"security":[2,17,27,120],"primitives":[3,29],"are":[4],"key":[5,94],"building":[6],"blocks":[7],"for":[8,39],"enabling":[9,124],"end-to-end":[10],"content":[11],"protection,":[12],"user":[13],"authentication":[14],"and":[15,96,126],"data":[16],"in":[18,54],"IoT":[19,44],"platforms.":[20],"This":[21],"talk":[22,83,109],"describes":[23],"the":[24,108,117],"design":[25,87,103],"of":[26,93,104,115,119],"circuit":[28,33,64],"that":[30],"employ":[31],"techniques":[34],"with":[35,78],"optimal":[36],"hardware-friendly":[37],"arithmetic":[38],"seamless":[40],"integration":[41],"into":[42],"area/battery-constrained":[43],"systems:":[45],"1)":[46],"A":[47],"2040-gate":[48],"AES":[49],"accelerator":[50],"achieving":[51],"289-Gbps/W":[52],"efficiency":[53],"22-nm":[55],"CMOS,":[56],"2)":[57],"Hardened":[58],"hybrid":[59],"physically":[60],"unclonablef":[61],"Function":[62],"(PUF)":[63],"to":[65,75,90],"generate":[66],"a":[67],"100%":[68],"stable":[69],"encryption":[70,105],"key.":[71],"3)":[72],"All-digital":[73],"TRNG":[74],"achieve":[76],">0.99-min-entropy":[77],"3-pJ/bit":[79],"energy":[80],"efficiency.":[81],"The":[82],"will":[84,110],"also":[85],"discuss":[86],"issues":[88],"related":[89],"side-channel":[91],"leakage":[92],"information,":[95],"how":[97],"they":[98],"may":[99],"be":[100],"addressed":[101],"during":[102],"circuits.":[106],"Finally,":[107],"touch":[111],"upon":[112],"existing":[113],"challenges":[114],"maintaining":[116],"integrity":[118],"circuits,":[121],"while":[122],"still":[123],"testability":[125],"post-silicon":[127],"validation.":[128]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
