{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:22:37Z","timestamp":1772252557774,"version":"3.50.1"},"reference-count":57,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,6,30]],"date-time":"2018-06-30T00:00:00Z","timestamp":1530316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001655","name":"Deutscher Akademischer Austauschdienst","doi-asserted-by":"publisher","award":["57210638"],"award-info":[{"award-number":["57210638"]}],"id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["CRC 1119 CROSSING Projekt P3"],"award-info":[{"award-number":["CRC 1119 CROSSING Projekt P3"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, the times needed in order to generate their responses may prohibit their widespread usage. To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly speed up the generation times for the responses of PUFs based on these retention times. In this work, we extend the work of Schaller et al. by presenting a run-time accessible implementation of this PUF and by further reducing the time required for the generation of its responses. Additionally, we also provide a more thorough investigation of the effects of temperature variations on the Row Hammer PUF and briefly discuss potential statistical relationships between the cells used to implement it. As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore, be commercially adopted in the near future.<\/jats:p>","DOI":"10.3390\/cryptography2030013","type":"journal-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T10:56:52Z","timestamp":1530529012000},"page":"13","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security \u2020"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0243-8594","authenticated-orcid":false,"given":"Nikolaos Athanasios","family":"Anagnostopoulos","sequence":"first","affiliation":[{"name":"Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, Darmstadt, 64293 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2078-3976","authenticated-orcid":false,"given":"Tolga","family":"Arul","sequence":"additional","affiliation":[{"name":"Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, Darmstadt, 64293 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3611-0191","authenticated-orcid":false,"given":"Yufan","family":"Fan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstra\u00dfe 25, Darmstadt, 64283 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0963-3632","authenticated-orcid":false,"given":"Christian","family":"Hatzfeld","sequence":"additional","affiliation":[{"name":"Measurement and Sensor Technology, Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstra\u00dfe 25, Darmstadt, 64283 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2491-3536","authenticated-orcid":false,"given":"Andr\u00e9","family":"Schaller","sequence":"additional","affiliation":[{"name":"Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, Darmstadt, 64293 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7626-2651","authenticated-orcid":false,"given":"Wenjie","family":"Xiong","sequence":"additional","affiliation":[{"name":"Computer Architecture and Security Laboratory, Department of Electrical Engineering, Yale University, 10 Hillhouse Avenue, New Haven, CT 06520, USA"}]},{"given":"Manishkumar","family":"Jain","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstra\u00dfe 25, Darmstadt, 64283 Hessen, Germany"}]},{"given":"Muhammad Umair","family":"Saleem","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstra\u00dfe 25, Darmstadt, 64283 Hessen, Germany"}]},{"given":"Jan","family":"Lotichius","sequence":"additional","affiliation":[{"name":"Measurement and Sensor Technology, Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstra\u00dfe 25, Darmstadt, 64283 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4097-9917","authenticated-orcid":false,"given":"Sebastian","family":"Gabmeyer","sequence":"additional","affiliation":[{"name":"Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, Darmstadt, 64293 Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9721-3640","authenticated-orcid":false,"given":"Jakub","family":"Szefer","sequence":"additional","affiliation":[{"name":"Computer Architecture and Security Laboratory, Department of Electrical Engineering, Yale University, 10 Hillhouse Avenue, New Haven, CT 06520, USA"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, Darmstadt, 64293 Hessen, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Schaller, A., Xiong, W., Anagnostopoulos, N.A., Saleem, M.U., Gabmeyer, S., Katzenbeisser, S., and Szefer, J. (2017, January 1\u20135). Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2017.7951729"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J.H., Lee, D., Wilkerson, C., Lai, K., and Mutlu, O. (2014, January 14\u201318). Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors. Proceedings of the 2014 ACM\/IEEE 41st International Symposium on Computer Architecture (ISCA), Minneapolis, MN, USA.","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"ref_3","unstructured":"Seaborn, M., and Dullien, T. (2018, April 15). Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges. Black Hat USA. Available online: (Presentation Slides) https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf (White Paper) https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges-wp.pdf."},{"key":"ref_4","unstructured":"Van der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C., Vigna, G., Bos, H., Razavi, K., and Giuffrida, C. (2016, January 24\u201328). Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. Proceedings of the Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria."},{"key":"ref_5","unstructured":"Xiao, Y., Zhang, X., Zhang, Y., and Teodorescu, R. (2016, January 10\u201312). One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA."},{"key":"ref_6","unstructured":"Razavi, K., Gras, B., Bosman, E., Preneel, B., Giuffrida, C., and Bos, H. (2016, January 10\u201312). Flip Feng Shui: Hammering a Needle in the Software Stack. Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA."},{"key":"ref_7","unstructured":"Caballero, J., Zurutuza, U., and Rodr\u00edguez, R.J. (2016). Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. Detection of Intrusions and Malware, and Vulnerability Assessment, Springer International Publishing."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Aweke, Z.B., Yitbarek, S.F., Qiao, R., Das, R., Hicks, M., Oren, Y., and Austin, T. (2016, January 2\u20136). ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS \u201916), Atlanta, GA, USA.","DOI":"10.1145\/2872362.2872390"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Qiao, R., and Seaborn, M. (2016, January 3\u20135). A New Approach for Rowhammer Attacks. Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2016.7495576"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fainstein, D., Rosenblatt, S., Cestero, A., Robson, N., Kirihata, T., and Iyer, S.S. (2012, January 13\u201315). Dynamic Intrinsic Chip ID Using 32nm High-K\/metal Gate SOI Embedded DRAM. Proceedings of the 2012 Symposium on VLSI Circuits (VLSIC), Honolulu, HI, USA.","DOI":"10.1109\/VLSIC.2012.6243832"},{"key":"ref_11","unstructured":"Okamura, T., Minematsu, K., Tsunoo, Y., Iida, T., Kimura, T., and Nakamura, K. (2012, January 1\u20132). DRAM PUF (In Japanese). Proceedings of the 29th Symposium on Cryptography and Information Security, Kanazawa, Japan."},{"key":"ref_12","unstructured":"Keller, C., Felber, N., G\u00fcrkaynak, F., Kaeslin, H., and Junod, P. (2018, April 15). Physically Unclonable Functions for Secure Hardware. Swiss National Science Foundation (SNSF), Nano-Tera.CH, RTD 2010\u2014QCrypt. (Poster) Available online: http:\/\/www.nano-tera.ch\/pdf\/posters2012\/QCrypt53.pdf."},{"key":"ref_13","unstructured":"Felber, N., and Gisin, N. (2012, January 26\u201327). Secure High-Speed Communication Based on Quantum Key Distribution. Swiss National Science Foundation (SNSF), Nano-Tera.CH, RTD 2010\u2014 QCrypt. Proceedings of the Annual Plenary Meeting, Zurich, Switzerland. (Presentation Slides) Available online: http:\/\/crypto.junod.info\/wp-content\/uploads\/2012\/06\/qcrypt-slides.pdf."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos, N.A., Katzenbeisser, S., Chandy, J., and Tehranipoor, F. (2018). An Overview of DRAM-Based Security Primitives. Cryptography, 2.","DOI":"10.3390\/cryptography2020007"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Karimian, N., Xiao, K., and Chandy, J. (2015, January 20\u201322). DRAM Based Intrinsic Physical Unclonable Functions for System Level Security. Proceedings of the 25th Edition on Great Lakes Symposium on VLSI (GLSVLSI \u201915), Pittsburgh, PA, USA.","DOI":"10.1145\/2742060.2742069"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1109\/TVLSI.2016.2606658","article-title":"DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication","volume":"25","author":"Tehranipoor","year":"2017","journal-title":"IEEE Trans. Large Scale Integr. (VLSI) Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., and Poschmann, A.Y. (2016). Run-Time Accessible DRAM PUFs in Commodity Devices. Cryptographic Hardware and Embedded Systems\u2014CHES 2016, Springer.","DOI":"10.1007\/978-3-662-53140-2"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Schaller, A., Xiong, W., Anagnostopoulos, N.A., Saleem, M.U., Gabmeyer, S., Skoric, B., Katzenbeisser, S., and Szefer, J. (2018). Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secure Comput.","DOI":"10.1109\/TDSC.2018.2822298"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hashemian, M.S., Singh, B., Wolff, F., Weyer, D., Clay, S., and Papachristou, C. (2015, January 9\u201313). A Robust Authentication Methodology Using Physically Unclonable Functions in DRAM Arrays. Proceedings of the 2015 Design, Automation Test in Europe Conference Exhibition (DATE), Grenoble, France.","DOI":"10.7873\/DATE.2015.0308"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kim, J.S., Patel, M., Hassan, H., and Mutlu, O. (2018, January 24\u201328). The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices. Proceedings of the 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA), Vienna, Austria.","DOI":"10.1109\/HPCA.2018.00026"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, J., Jaiyen, B., Kim, Y., Wilkerson, C., and Mutlu, O. (2013, January 23\u201327). An Experimental Study of Data Retention Behavior in Modern DRAM Devices: Implications for Retention Time Profiling Mechanisms. Proceedings of the 40th Annual International Symposium on Computer Architecture, Tel-Aviv, Israel.","DOI":"10.1145\/2485922.2485928"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kim, Y., Seshadri, V., Lee, D., Liu, J., and Mutlu, O. (2012, January 9\u201313). A Case for Exploiting Subarray-Level Parallelism (SALP) in DRAM. Proceedings of the 2012 39th Annual International Symposium on Computer Architecture (ISCA), Portland, OR, USA.","DOI":"10.1109\/ISCA.2012.6237032"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhang, T., Chen, K., Xu, C., Sun, G., Wang, T., and Xie, Y. (2014, January 14\u201318). Half-DRAM: A high-bandwidth and low-power DRAM architecture from the rethinking of fine-grained activation. Proceedings of the 2014 ACM\/IEEE 41st International Symposium on Computer Architecture (ISCA), Minneapolis, MN, USA.","DOI":"10.1109\/ISCA.2014.6853217"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bhati, I., Chishti, Z., Lu, S.L., and Jacob, B. (2015, January 13\u201317). Flexible Auto-Refresh: Enabling Scalable and Energy-Efficient DRAM Refresh Reductions. Proceedings of the 2015 ACM\/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA), Portland, OR, USA.","DOI":"10.1145\/2749469.2750408"},{"key":"ref_25","unstructured":"Micheletti, M., and LeCroy, T. (2013). Tuning DDR4 for Power and Performance. MemCon, Available online: http:\/\/www.memcon.com\/pdfs\/proceedings2013\/track1\/Tuning_DDR4_for_Power_and_Performance.pdf."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Mutlu, O. (2017, January 27\u201331). The RowHammer Problem and Other Issues We May Face as Memory Becomes Denser. Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE), Lausanne, Switzerland.","DOI":"10.23919\/DATE.2017.7927156"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chia, P.C.F., Wen, S.J., and Baeg, S.H. (2010, January 17\u201321). New DRAM HCI Qualification Method Emphasizing on Repeated Memory Access. Proceedings of the 2010 IEEE International Integrated Reliability Workshop Final Report, Fallen Leaf, CA, USA.","DOI":"10.1109\/IIRW.2010.5706509"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Baeg, S., Chia, P., Wen, S., and Wong, R. (2011, January 4\u20137). DRAM Failure Cases Under Hot-Carrier Injection. Proceedings of the 18th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), Incheon, South Korea.","DOI":"10.1109\/IPFA.2011.5992747"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bidokhti, N., Tehranipoor, M., Chen, J., and Lee, J. (2014, January 27\u201330). Life After Failure. Proceedings of the 2014 Reliability and Maintainability Symposium, Colorado Springs, CO, USA.","DOI":"10.1109\/RAMS.2014.6798522"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Jung, M., Rheinl\u00e4nder, C.C., Weis, C., and Wehn, N. (2016). Reverse Engineering of DRAMs: Row Hammer with Crosshair. Proceedings of the Second International Symposium on Memory Systems, ACM.","DOI":"10.1145\/2989081.2989114"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., and Poschmann, A.Y. (2016). Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. Cryptographic Hardware and Embedded Systems\u2014CHES 2016, Springer.","DOI":"10.1007\/978-3-662-53140-2"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Patranabis, S., and Mukhopadhyay, D. (2018). Advanced Fault Attacks in Software: Exploiting the Rowhammer Bug. Fault Tolerant Architectures for Cryptography and Hardware Security, Springer.","DOI":"10.1007\/978-981-10-1387-4"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jang, Y., Lee, J., Lee, S., and Kim, T. (2017, January 28). SGX-Bomb: Locking Down the Processor via Rowhammer Attack. Proceedings of the 2nd Workshop on System Software for Trusted Execution, Shanghai, China.","DOI":"10.1145\/3152701.3152709"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yan, W., Tehranipoor, F., and Chandy, J.A. (2015, January 2\u20136). A Novel Way to Authenticate Untrusted Integrated Circuits. Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372560"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1109\/TCAD.2016.2638445","article-title":"PUF-Based Fuzzy Authentication Without Error Correcting Codes","volume":"36","author":"Yan","year":"2017","journal-title":"IEEE Trans. Comput.-Aided Design Integr. Circuits Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., and Verbauwhede, I. (July, January 28). A Soft Decision Helper Data Algorithm for SRAM PUFs. Proceedings of the 2009 IEEE International Symposium on Information Theory, Seoul, Korea.","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Paillier, P., and Verbauwhede, I. (2007). FPGA Intrinsic PUFs and Their Use for IP Protection. Cryptographic Hardware and Embedded Systems\u2014CHES 2007, Springer.","DOI":"10.1007\/978-3-540-74735-2"},{"key":"ref_38","unstructured":"Holcomb, D.E., Burleson, W.P., and Fu, K. (,  2007). Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. Proceedings of the Conference on RFID Security, Available online: http:\/\/www.rfidsec07.etsit.uma.es\/slides\/papers\/paper-12.pdf."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.R., Sasse, A., and Beres, Y. (2011). Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations. Trust and Trustworthy Computing, Springer.","DOI":"10.1007\/978-3-642-21599-5"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical Unclonable Functions and Applications: A Tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Yan, W., Jin, C., Tehranipoor, F., and Chandy, J.A. (2017, January 4\u20138). Phase Calibrated Ring Oscillator PUF Design and Implementation on FPGAs. Proceedings of the 2017 27th International Conference on Field Programmable Logic and Applications (FPL), Ghent, Belgium.","DOI":"10.23919\/FPL.2017.8056859"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Schrijen, G.J., and van der Leest, V. (2012, January 12\u201316). Comparative Analysis of SRAM Memories Used as PUF Primitives. Proceedings of the 2012 Design, Automation Test in Europe Conference Exhibition (DATE), Dresden, Germany.","DOI":"10.1109\/DATE.2012.6176696"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Prouff, E., and Schaumont, P. (2012). PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. Cryptographic Hardware and Embedded Systems\u2014CHES 2012, Springer.","DOI":"10.1007\/978-3-642-33027-8"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/16.678551","article-title":"On the Retention Time Distribution of Dynamic Random Access Memory (DRAM)","volume":"45","author":"Hamamoto","year":"1998","journal-title":"IEEE Trans. Electron Devices"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Aichinger, B. (2015, January 15\u201317). DDR Memory Errors Caused by Row Hammer. Proceedings of the 2015 IEEE High Performance Extreme Computing Conference (HPEC), Waltham, MA, USA.","DOI":"10.1109\/HPEC.2015.7322462"},{"key":"ref_46","unstructured":"PandaBoard (2018, April 15). OMAPpedia.org Wiki. Available online: http:\/\/omappedia.org\/wiki\/PandaBoard."},{"key":"ref_47","unstructured":"(2018, April 15). OMAP4460 Pandaboard ES System Reference Manual. Available online: https:\/\/www.cs.utexas.edu\/~simon\/378\/resources\/PandaBoardES.pdf."},{"key":"ref_48","unstructured":"(2018, April 15). OMAP4460 Multimedia Device Technical Reference Manual. Available online: http:\/\/www.ti.com\/lit\/ug\/swpu235ab\/swpu235ab.pdf."},{"key":"ref_49","unstructured":"(2018, April 15). 8 G bits DDR2 Mobile RAM PoP (12mm \u00d7 12mm, 216-ball FBGA) EDB8164B3PF. Available online: https:\/\/www.micron.com\/parts\/dram\/mobile-ddr2-sdram\/edb8164b3pf-8d-f."},{"key":"ref_50","unstructured":"(2018, April 15). Das U-Boot\u2014The Universal Boot Loader. Available online: http:\/\/www.denx.de\/wiki\/U-Boot\/WebHome."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Kraft, K., Sudarshan, C., Mathew, D.M., Weis, C., Wehn, N., and Jung, M. (2018, January 19\u201323). Improving the error behavior of DRAM by exploiting its Z-channel property. Proceedings of the 2018 Design, Automation Test in Europe Conference Exhibition (DATE), Dresden, Germany.","DOI":"10.23919\/DATE.2018.8342249"},{"key":"ref_52","first-page":"547","article-title":"\u00c9tude Comparative de la Distribution Florale dans une Portion des Alpes et du Jura","volume":"Volume 37","author":"Jaccard","year":"1901","journal-title":"Bulletin de la Societe Vaudoise des Sciences Naturelles"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Cachin, C., and Camenisch, J.L. (2004). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Advances in Cryptology\u2014EUROCRYPT 2004, Springer.","DOI":"10.1007\/b97182"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Rahmati, A., Hicks, M., Holcomb, D.E., and Fu, K. (2015, January 13\u201317). Probable Cause: The Deanonymizing Effects of Approximate DRAM. Proceedings of the 42nd Annual International Symposium on Computer Architecture, Portland, OR, USA.","DOI":"10.1145\/2749469.2750419"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"379","DOI":"10.3758\/BF03192707","article-title":"Recommended Effect Size Statistics for Repeated Measures Designs","volume":"37","author":"Bakeman","year":"2005","journal-title":"Behav. Res. Methods"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1506409.1506429","article-title":"Lest We Remember: Cold-boot Attacks on Encryption Keys","volume":"52","author":"Halderman","year":"2009","journal-title":"Commun. ACM"},{"key":"ref_57","unstructured":"Anagnostopoulos, N.A. (2014). Optical Fault Injection Attacks in Smart Card Chips and an Evaluation of Countermeasures against Them. [Master\u2019s Thesis, University of Twente]."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:10:51Z","timestamp":1760195451000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,30]]},"references-count":57,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["cryptography2030013"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2030013","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints201804.0369.v1","asserted-by":"object"}]},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,30]]}}}