Design of the RRAM-Based Polymorphic Look-Up Table Scheme

被引:7
|
作者
Cui, Xiaole [1 ]
Li, Xiang [1 ]
Zhang, Miaomiao [1 ]
Cui, Xiaoxin [2 ]
机构
[1] Peking Univ, Key Lab Integrated Microsyst, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Peking Univ, Inst Microelect, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Logic gates; Table lookup; Resistance; Foundries; Resists; Reverse engineering; Logic functions; RRAM; polymorphic gate; look-up table;
D O I
10.1109/JEDS.2019.2934471
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The polymorphic gates are the circuit cells that deliver different functions with the different external input, supply voltage or temperature. It is an effective method to resist the reverse engineering attacks, for the attackers cannot distinguish the correct function based on the netlist of the circuit. The researchers have found out that the RRAM based Look-Up Table (LUT) has higher performance and less area, comparing with the CMOS based counterparts. However, the attackers can tell the functions of the previous proposed RRAM based LUTs by measuring the resistance states of the RRAM cells. This work proposes an RRAM based polymorphic gate, which implements 16 basic logic functions with 8 RRAM cells in 4 working cycles. Furthermore, the multi-input LUT scheme is proposed based on the polymorphic gate. It is difficult for the attackers to distinguish the circuit function, because the function of the LUT is determined by the applied voltages and the resistance states of the RRAM devices, and the n-input LUT circuit is implemented with the constant area regardless of the number of inputs.
引用
收藏
页码:949 / 953
页数:5
相关论文
共 50 条
  • [1] A novel table look-up scheme based on GFScom and its application
    Zhang, Shengli
    Li, Yongming
    SOFT COMPUTING, 2017, 21 (22) : 6767 - 6781
  • [2] A novel table look-up scheme based on GFScom and its application
    Shengli Zhang
    Yongming Li
    Soft Computing, 2017, 21 : 6767 - 6781
  • [3] Elliptic curves cryptosystem implementation based on a look-up table sharing scheme
    Liu, Sining
    Bowen, Francis
    King, Brian
    Wang, Wei
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 2921 - +
  • [4] A More Secure Chaotic Cryptographic Scheme Based on the Dynamic Look-Up Table
    Kwok-Wo Wong
    Kwan-Pok Man
    Shujun Li
    Xiaofeng Liao
    Circuits, Systems and Signal Processing, 2005, 24 : 571 - 584
  • [5] A more secure chaotic cryptographic scheme based on the dynamic look-up table
    Wong, KW
    Man, KP
    Li, SJ
    Liao, XF
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2005, 24 (05) : 571 - 584
  • [6] Programmable Look-Up Table-Based Interpolator with Nonuniform Sampling Scheme
    Silva, Elvio Carlos Dutra e, Jr.
    Indrusiak, Leandro Soares
    Finamore, Weiler Alves
    Glesner, Manfred
    INTERNATIONAL JOURNAL OF RECONFIGURABLE COMPUTING, 2012, 2012
  • [7] A fast chaotic cryptographic scheme with dynamic look-up table
    Wong, KW
    PHYSICS LETTERS A, 2002, 298 (04) : 238 - 242
  • [8] Antecedent Validity Adaptation principle for Table Look-up scheme
    Chan, PT
    Rad, AB
    NEW PARADIGM OF KNOWLEDGE ENGINEERING BY SOFT COMPUTING, 2001, 5 : 77 - 94
  • [9] TABLE LOOK-UP RULE
    HARALICK, RM
    COMMUNICATIONS IN STATISTICS PART A-THEORY AND METHODS, 1976, 5 (12): : 1163 - 1191
  • [10] Design of Square Generator with Small Look-up Table
    Tsai, Wei-Chang
    Shieh, Ming-Der
    Lin, Wen-Chin
    Wey, Chin-Long
    2008 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2008), VOLS 1-4, 2008, : 172 - +