Despite the impressive demonstrations with silicon and oxide memristors, realizing efficient roots of trust for resource-constrained hardware remains a challenge. Here, the authors exploit switching behavior in one dimensional perovskite memristors to design security primitives for key generation and device authentication.
- Rohit Abraham John
- Nimesh Shah
- Nripan Mathews