comparemela.com

Page 13 - Saptarshi Das News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Graphene physically unclonable function

Graphene physically unclonable function Graphene transistors have been used to create a physically unclonable function (a PUF) – one of the key building blocks of high-end on-chip security. PUFs create numbers from the fine-grained randomness found in in an individual IC, due to doping and manufacturing variations, for example. In this case, variations in the carrier transport of graphene transistors was used, which follow Gaussian random distributions, according to Penn State University, where the PUF was made. The team first fabricated nearly 2,000 graphene transistors, intended to be identical, but with variations due to differences in Dirac voltage, Dirac conductance and carrier mobility.

Graphene key for novel hardware security - ScienceBlog com

Graphene key for novel hardware security As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, Penn State researchers have designed a way to make the encrypted keys harder to crack. Led by Saptarshi Das, assistant professor of engineering science and mechanics, the researchers used graphene a layer of carbon one atom thick to develop a novel low-power, scalable, reconfigurable hardware security device with significant resilience to AI attacks. They published their findings in Nature Electronics today (May 10).

Researchers design a graphene-based encrypted key for novel hardware security

Researchers design a graphene-based encrypted key for novel hardware security Penn State researchers have designed a graphene-based way to make encrypted keys harder to crack, in an attempt to protect data in an age where more and more private data is stored and shared digitally. Current silicon technology exploits microscopic differences between computing components to create secure keys, but the team explains that artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Image credit: Jennifer McCann/Penn State Led by Saptarshi Das, assistant professor of engineering science and mechanics, the researchers used graphene to develop a novel low-power, scalable, reconfigurable hardware security device with significant resilience to AI attacks.

Graphene key for novel hardware security

 E-Mail IMAGE: A team of Penn State researchers has developed a new hardware security device that takes advantage of microstructure variations to generate secure keys. view more  Credit: Jennifer McCann,Penn State As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, Penn State researchers have designed a way to make the encrypted keys harder to crack.

Transistors built from ultra-thin 2D materials take a step forward

Transistors built from ultra-thin 2D materials take a step forward Two-dimensional materials can be used to create smaller, high-performance transistors traditionally made of silicon, according to Saptarshi Das, assistant professor of engineering science and mechanics (ESM) in Penn State’s College of Engineering. Das and his collaborators report in Nature Communications on tests to determine the technological viability of transistors made from 2D materials. Transistors are tiny digital switches found in cell phones, computer circuits, smart watches and the like. “We live in a digital and connected world driven by data,” Das said. “Big data requires increased storage and processing power. If you want to store or process more data, you need to utilize more and more transistors.”

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.