期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Design of 1 kbit antifuse one time programmable memory IP using dual program voltage
1
作者 金丽妍 JANG Ji-Hye +1 位作者 KIM Du-Hwi KIM Young-Hee 《Journal of Central South University》 SCIE EI CAS 2011年第1期125-132,共8页
A 1 kbit antifuse one time programmable(OTP) memory IP,which is one of the non-volatile memory IPs,was designed and used for power management integrated circuits(ICs).A conventional antifuse OTP cell using a single po... A 1 kbit antifuse one time programmable(OTP) memory IP,which is one of the non-volatile memory IPs,was designed and used for power management integrated circuits(ICs).A conventional antifuse OTP cell using a single positive program voltage(VPP) has a problem when applying a higher voltage than the breakdown voltage of the thin gate oxides and at the same time,securing the reliability of medium voltage(VM) devices that are thick gate transistors.A new antifuse OTP cell using a dual program voltage was proposed to prevent the possibility for failures in a qualification test or the yield drop.For the newly proposed cell,a stable sensing is secured from the post-program resistances of several ten thousand ohms or below due to the voltage higher than the hard breakdown voltage applied to the terminals of the antifuse.The layout size of the designed 1 kbit antifuse OTP memory IP with Dongbu HiTek's 0.18 μm Bipolar-CMOS-DMOS(BCD) process is 567.9 μm×205.135 μm and the post-program resistance of an antifuse is predicted to be several ten thousand ohms. 展开更多
关键词 one time programmable memory IP ANTIFUSE hard breakdown dual program voltage post-program resistance
下载PDF
NOT FOR ONE TIME USE ONLY
2
作者 DING YING 《Beijing Review》 2007年第31期14-15,共2页
The Olympic stadiums, at a cost of billions of dollars, should be well utilized after the Beijing Olympic Games Now that the bell of the 2008 Beijing Olympic Games is soon to ring, people at home and abroad
关键词 NOT FOR one time USE ONLY
原文传递
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
3
作者 Dognery Sinaly Silue Wanggen Wan Muhammad Rizwan 《Open Journal of Applied Sciences》 2016年第13期893-902,共10页
With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has b... With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has become the important challenge, but network information security has become a top priority. In the field of authentication, dynamic password technology has gained users’ trust and favor because of its safety and ease of operation. Dynamic password, SHA (Secure Hash Algorithm) is widely used globally and acts as information security mechanism against potential threat. The cryptographic algorithm is an open research area, and development of these state-owned technology products helps secure encryption product and provides safeguard against threats. Dynamic password authentication technology is based on time synchronization, using the state-owned password algorithm. SM3 hash algorithm can meet the security needs of a variety of cryptographic applications for commercial cryptographic applications and verification of digital signatures, generation and verification of message authentication code. Dynamic password basically generates an unpredictable random numbers based on a combination of specialized algorithms. Each password can only be used once, and help provide high safety. Therefore, the dynamic password technology for network information security issues is of great significance. In our proposed algorithm, dynamic password is generated by SM3 Hash Algorithm using current time and the identity ID and it varies with time and changes randomly. Coupled with the SM3 hash algorithm security, dynamic password security properties can be further improved, thus it effectively improves network authentication security. 展开更多
关键词 Dynamic Password Authentication SM3 Hash Algorithm Network Authentication Security one time Password
下载PDF
Design of an 8 bit differential paired eFuse OTP memory IP reducing sensing resistance 被引量:1
4
作者 JANG Ji-Hye 金丽妍 +3 位作者 JEON Hwang-Gon KIM Kwang-Il HA Pan-Bong KIM Young-Hee 《Journal of Central South University》 SCIE EI CAS 2012年第1期168-173,共6页
For the conventional single-ended eFuse cell, sensing failures can occur due to a variation of a post-program eFuse resistance during the data retention time and a relatively high program resistance of several kilo oh... For the conventional single-ended eFuse cell, sensing failures can occur due to a variation of a post-program eFuse resistance during the data retention time and a relatively high program resistance of several kilo ohms. A differential paired eFuse cell is designed which is about half the size smaller in sensing resistance of a programmed eFuse link than the conventional single-ended eFuse cell. Also, a sensing circuit of sense amplifier is proposed, based on D flip-flop structure to implement a simple sensing circuit. Furthermore, a sensing margin test circuit is proposed with variable pull-up loads out of consideration for resistance variation of a programmed eFuse. When an 8 bit eFuse OTP IP is designed with 0.18 ~tm standard CMOS logic of TSMC, the layout dimensions are 229.04 μm ×100.15μm. All the chips function successfully when 20 test chips are tested with a program voltage of 4.2 V. 展开更多
关键词 eFuse differential paired efuse cell one time programmable memory sensing resistance D flip-flop based sense amplifier
下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
5
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation RSA algorithm
下载PDF
Authentication Key-Exchange Using SMS for Web-Based Platforms
6
作者 Benedicto B. Balilo Jr. Jayvee Christopher N. Vibar 《Journal of Computer and Communications》 2021年第8期1-12,共12页
One of the advantages of One Time Password (OTP) is that it’s free from brute force, replay, and shoulder attacks. The codes may originate from different entropy attributes and schemes, such as true random and digita... One of the advantages of One Time Password (OTP) is that it’s free from brute force, replay, and shoulder attacks. The codes may originate from different entropy attributes and schemes, such as true random and digital random number generators. Businesses, organizations, and academic institutions have adopted OTP methods for credit card transaction confirmation, recalling forgotten passwords, and validating web portal accounts. This paper proposed a new method in authenticating login credentials using a 3 × 3 matrix and random system key as Two-Factor Authentication (2FA) with an SMS-enabled feature. We used the 6-codes pseudorandom method and a 4-codes validation to allow mobile flexibility and ensure that the user has the required access. The page link and evaluation form are sent to students, IT professionals, and researchers. The results showed respondents are satisfied in terms of functionality, usability, efficiency, and reliability. The developed system could safeguard information, disallow unauthorized access, and impose acceptable data protection measures and minimal system requirements to use the system. 展开更多
关键词 one time Password Two-Factor Authentication (2FA) CRYPTOGRAPHY ISO9126
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部