The effect of switching and cycle-to-cycle variations of RRAM on 4-bit encryption/decryption process
The resistive RAM (RRAM) based in-memory computation is a promising technology to overcome the Von-Neumann bottleneck to provide fast and efficient computation. The RRAM is the most appropriate choice for cryptographic applications like encryption/decryption in which the data is computed and stored...
| Main Authors: | Nivetha, T., Bindu, B., Kamsani, Noor Ain |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/113240/ http://psasir.upm.edu.my/id/eprint/113240/1/113240.pdf |
Similar Items
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
by: Elfadil, Sabeil Mohamed Ali
Published: (2009)
by: Elfadil, Sabeil Mohamed Ali
Published: (2009)
Demonstration of duty cycle division multiplexing with bit error rate estimation
by: Mohd Basir, Safuraa, et al.
Published: (2009)
by: Mohd Basir, Safuraa, et al.
Published: (2009)
Cycle-to-Cycle Variations of a Diesel Engine Operating with Palm Biodiesel
by: R., Mamat, et al.
Published: (2013)
by: R., Mamat, et al.
Published: (2013)
Characteristic of Blended Fuel Properties and Engine Cycle To-Cycle Variations with Butanol Additive
by: Obed M., Ali, et al.
Published: (2014)
by: Obed M., Ali, et al.
Published: (2014)
Processing Data in Cloud Environments without the Need for Decryption
by: Jaber, Aws Naser, et al.
by: Jaber, Aws Naser, et al.
Duty-cycle-division-multiplexing: bit error rate estimation and performance evaluation
by: Mahdiraji, Ghafour Amouzad, et al.
Published: (2009)
by: Mahdiraji, Ghafour Amouzad, et al.
Published: (2009)
A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem
by: Yusof, Siti Nabilah, et al.
Published: (2024)
by: Yusof, Siti Nabilah, et al.
Published: (2024)
Bipolar resistive switching of bi-layered Pt/Ta2O5/TaOx/Pt RRAM : physics-based modelling, circuit design and testing
by: Hatem, Firas Odai
Published: (2017)
by: Hatem, Firas Odai
Published: (2017)
Investigation of Influences of Secondary butyl-alcohol Blends on Performance and Cycle-To-Cycle Variations in a Spark Ignition Engines
by: I. M., Yusri, et al.
Published: (2017)
by: I. M., Yusri, et al.
Published: (2017)
Analysis of Blended Fuel Properties and Cycle-To-Cycle Variation In A Diesel Engine With A Diethyl Ether Additive
by: Obed M., Ali, et al.
Published: (2016)
by: Obed M., Ali, et al.
Published: (2016)
Fast decryption methods for the Somsuk-RSA cryptosystem.
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
Decrypting the real life escape room experience
by: Lim, Qian Pink, et al.
Published: (2019)
by: Lim, Qian Pink, et al.
Published: (2019)
The supercontinent cycle
by: Mitchell, R.N., et al.
Published: (2021)
by: Mitchell, R.N., et al.
Published: (2021)
Development Of An 8-Bit Fpga-Based Asynchronous Risc Pipelined Processor For Data Encryption
by: Pang, Wai Leong
Published: (2003)
by: Pang, Wai Leong
Published: (2003)
Business cycles and monetary policy asymmetry: An investigation using Markov-switching models
by: TAN, S, et al.
Published: (2007)
by: TAN, S, et al.
Published: (2007)
Cycling infrastructure for reducing cycling injuries in cyclists
by: Mulvaney, Caroline A., et al.
Published: (2015)
by: Mulvaney, Caroline A., et al.
Published: (2015)
"You just have to take a bit of a risk sometimes": Breaking the 'cycle of tradition' in mathematics education
by: Frid, Sandra, et al.
Published: (2009)
by: Frid, Sandra, et al.
Published: (2009)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Plower Cycle Enterprise : "Plower Cycle" / Mohamad Asraf Mohd Saif...[et.al]
by: Rostam, Zulkifli, et al.
Published: (2016)
by: Rostam, Zulkifli, et al.
Published: (2016)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Sarawak cycling
by: The Star,
Published: (2013)
by: The Star,
Published: (2013)
Cycling for charity
by: The Star,
Published: (2013)
by: The Star,
Published: (2013)
Cycling in UPM
by: The Star,
Published: (2013)
by: The Star,
Published: (2013)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Consumption smoothing in Mexico over the life-cycle and the business cycle
by: Barbosa Rangel, Erika
Published: (2017)
by: Barbosa Rangel, Erika
Published: (2017)
Carbon Nanotube Field Effect Transistor (CNTFET) and Resistive Random Access Memory (RRAM) based ternary combinational logic circuits
by: Zahoor, Furqan, et al.
Published: (2021)
by: Zahoor, Furqan, et al.
Published: (2021)
42 UMP staff cycles 46 km to complete the cycling mission
by: Nor Salwana, Mohammad Idris
Published: (2020)
by: Nor Salwana, Mohammad Idris
Published: (2020)
Variations in the number of hidden nodes through multilayer perceptron networks to predict cycle time
by: Ahmad Afif, Ahmarofi, et al.
Published: (2020)
by: Ahmad Afif, Ahmarofi, et al.
Published: (2020)
Life cycle cost
by: Abdul Rashid, Khairuddin, et al.
Published: (2016)
by: Abdul Rashid, Khairuddin, et al.
Published: (2016)
Clustered housing cycles
by: Hernandez-Murillo, Ruben, et al.
Published: (2017)
by: Hernandez-Murillo, Ruben, et al.
Published: (2017)
Pricing over the cycle
by: Bloch, Harry, et al.
Published: (2001)
by: Bloch, Harry, et al.
Published: (2001)
Mouse 'plague' cycle
by: Kinsella, John
Published: (2013)
by: Kinsella, John
Published: (2013)
Cycling for a mission
by: The Star, Y.P sivam
Published: (2012)
by: The Star, Y.P sivam
Published: (2012)
Let's cycle to class
by: New Straits Times, Arnaz M.Khairul
Published: (2012)
by: New Straits Times, Arnaz M.Khairul
Published: (2012)
Effects Of Cycle Peak Temperature Ratio On The Performance Of Combined Cycle Power Plant
by: Ibrahim, Thamir K., et al.
Published: (2016)
by: Ibrahim, Thamir K., et al.
Published: (2016)
Energy efficient 8-bit microprocessor for wireless sensor network applications
by: Hoon, Yap, et al.
Published: (2013)
by: Hoon, Yap, et al.
Published: (2013)
Determining an appropriate number of bits for a digitally controlled reflectarray cell with MEMS switches
by: Wu, B., et al.
Published: (2008)
by: Wu, B., et al.
Published: (2008)
Similar Items
-
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
by: Elfadil, Sabeil Mohamed Ali
Published: (2009) -
Demonstration of duty cycle division multiplexing with bit error rate estimation
by: Mohd Basir, Safuraa, et al.
Published: (2009) -
Cycle-to-Cycle Variations of a Diesel Engine Operating with Palm Biodiesel
by: R., Mamat, et al.
Published: (2013)