Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
True random number generators (TRNGs), which create cryptographically secure random bitstreams, hold great promise in addressing security concerns regarding hardware, communication, and authentication in the Internet of Things (IoT) realm. Recently, TRNGs based on nanoscale materials have gained considerable attention for avoiding conventional and predictable hardware circuitry designs that can be vulnerable to machine learning (ML) attacks. In this article, a low-power and low-cost TRNG developed by exploiting stochastic ferroelectric polarization switching in 2D ferroelectric CuInPS (CIPS)-based capacitive structures, is reported. The stochasticity arises from the probabilistic switching of independent electrical dipoles. The TRNG exhibits enhanced stochastic variability with near-ideal entropy, uniformity, uniqueness, Hamming distance, and independence from autocorrelation variations. Its unclonability is systematically examined using device-to-device variations. The generated cryptographic bitstreams pass the National Institute of Standards and Technology (NIST) randomness tests. This nanoscale CIPS-based TRNG is circuit-integrable and exhibits potential for hardware security in edge devices with advanced data encryption.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1002/adma.202406850 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!