Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 理學院
  3. 應用物理研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/80885
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor張慶瑞(Ching-Ray Chang)
dc.contributor.authorWei-Chen Chienen
dc.contributor.author錢偉臣zh_TW
dc.date.accessioned2022-11-24T03:20:28Z-
dc.date.available2021-11-05
dc.date.available2022-11-24T03:20:28Z-
dc.date.copyright2021-11-05
dc.date.issued2021
dc.date.submitted2021-10-18
dc.identifier.citation[1] A. Alaghi, W. Qian, and J. P. Hayes. The Promise and Challenge of Stochastic Computing. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., 37(8):1515– 1531, Aug. 2018. [2] M. A. Alia, A. A. Tamimi, and O. N. AL-Allaf. Cryptography based authentication methods. WCECS 2014, 22-24 October, 2014, San Francisco, USA, 2014. [3] D. Alsina, A. Cervera, D. Goyeneche, J. I. Latorre, and K. Życzkowski. Operational approach to Bell inequalities: applications to qutrits. Phys. Rev. A, 94(3):032102, Sept. 2016. arXiv: 1606.01991. [4] D. Alsina and J. I. Latorre. Experimental test of Mermin inequalities on a 5-qubit quantum computer. Phys. Rev. A, 94(1):012314, July 2016. arXiv: 1605.04220. [5] L. Ardito, G. Procaccianti, M. Torchiano, and A. Vetro. Understanding Green Software Development: A Conceptual Framework. IT Prof., 17(1):44–50, Jan. 2015. [6] F. Arute, K. Arya, R. Babbush, D. Bacon, J. C. Bardin, R. Barends, R. Biswas, S. Boixo, F. G. S. L. Brandao, D. A. Buell, B. Burkett, Y. Chen, Z. Chen, B. Chiaro, R. Collins, W. Courtney, A. Dunsworth, E. Farhi, B. Foxen, A. Fowler, C. Gidney, M. Giustina, R. Graff, K. Guerin, S. Habegger, M. P. Harrigan, M. J. Hartmann, A. Ho, M. Hoffmann, T. Huang, T. S. Humble, S. V. Isakov, E. Jeffrey, Z. Jiang, D. Kafri, K. Kechedzhi, J. Kelly, P. V. Klimov, S. Knysh, A. Korotkov, F. Kostritsa, D. Landhuis, M. Lindmark, E. Lucero, D. Lyakh, S. Mandrà, J. R. McClean, M. McEwen, A. Megrant, X. Mi, K. Michielsen, M. Mohseni, J. Mutus, O. Naaman, M. Neeley, C. Neill, M. Y. Niu, E. Ostby, A. Petukhov, J. C. Platt, C. Quintana, E. G. Rieffel, P. Roushan, N. C. Rubin, D. Sank, K. J. Satzinger, V. Smelyanskiy, K. J. Sung, M. D. Trevithick, A. Vainsencher, B. Villalonga, T. White, Z. J. Yao, P. Yeh, A. Zalcman, H. Neven, and J. M. Martinis. Quantum supremacy using a programmable superconducting processor. Nature, 574(7779):505–510, Oct. 2019. Number: 7779 Reporter: Nature. [7] A. Aspect, J. Dalibard, and G. Roger. Experimental Test of Bell’s Inequalities Using Time- Varying Analyzers. Phys. Rev. Lett., 49(25):1804–1807, Dec. 1982. [8] A. Aspect, P. Grangier, and G. Roger. Experimental Tests of Realistic Local Theories via Bell’s Theorem. Phys. Rev. Lett., 47(7):460–463, Aug. 1981. [9] A. Balijepalli, S. Sinha, and Y. Cao. Compact modeling of carbon nanotube transistor for early stage process-design exploration. In Proceedings of the 2007 international symposium on Low power electronics and design - ISLPED ’07, pages 2–7, Portland, OR, USA, 2007. ACM Press. [10] W. Barker, W. Polk, and M. Souppaya. Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms. Technical report, National Institute of Standards and Technology, Apr. 2021. [11] L. Bassham, A. Rukhin, J. Soto, J. Nechvatal, M. Smid, S. Leigh, M. Levenson, M. Vangel, N. Heckert, and D. Banks. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, Sept. 2010. [12] J. S. Bell. On the Einstein Podolsky Rosen paradox. Physics Physique Fizika, 1(3):195–200, Nov. 1964. [13] Y. Cao, T. Sato, M. Orshansky, D. Sylvester, and C. Hu. New paradigm of predictive MOSFET and interconnect modeling for early circuit simulation. In Proceedings of the IEEE 2000 Custom Integrated Circuits Conference (Cat. No.00CH37044), pages 201–204, Orlando, FL, USA, 2000. IEEE. [14] T.-H. H. Chan, E. Shi, and D. Song. Optimal Lower Bound for Differentially Private Multi-party Aggregation. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, L. Epstein, and P. Ferragina, editors, Algorithms–ESA 2012, volume 7501, pages 277–288. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012. Series Title: Lecture Notes in Computer Science. [15] Y.-A. Chen, Q. Zhang, T.-Y. Chen, W.-Q. Cai, S.-K. Liao, J. Zhang, K. Chen, J. Yin, J.-G. Ren, Z. Chen, S.-L. Han, Q. Yu, K. Liang, F. Zhou, X. Yuan, M.-S. Zhao, T.-Y. Wang, X. Jiang, L. Zhang, W.-Y. Liu, Y. Li, Q. Shen, Y. Cao, C.-Y. Lu, R. Shu, J.-Y. Wang, L. Li, N.-L. Liu, F. Xu, X.-B. Wang, C.-Z. Peng, and J.-W. Pan. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature, 589(7841):214–219, Jan. 2021. [16] Z. Chen. Bell-Klyshko Inequalities to Characterize Maximally Entangled Statesof n Qubits. Phys. Rev. Lett., 93(11):110403, Sept. 2004. [17] W.-C. Chien, Y.-C. Chang, Y.-T. Tsou, S.-Y. Kuo, and C.-R. Chang. STT-DPSA: Digital PUF-Based Secure Authentication Using STT-MRAM for the Internet of Things. Micromachines, 11(5):502, May 2020. [18] W.-C. Chien, S.-J. Jhan, K.-L. Chiu, Y.-x. Liu, E. Kao, and C.-R. Chang. Cryogenic Materials and Circuit Integration for Quantum Computers. Journal of Elec Materi, 49(11):6844–6858, Nov. 2020. [19] J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt. Proposed Experiment to Test Local Hidden-Variable Theories. Phys. Rev. Lett., 23(15):880–884, Oct. 1969. [20] R. Colbeck and A. Kent. Private randomness expansion with untrusted devices. J. Phys. A: Math. Theor., 44(9):095305, Mar. 2011. [21] N. T. Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In G. Goos, J. Hartmanis, J. van Leeuwen, and D. Boneh, editors, Advances in Cryptology - CRYPTO 2003, volume 2729, pages 176–194. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003. Series Title: Lecture Notes in Computer Science. [22] J. Das, K. Scott, and S. Bhanja. MRAM PUF: Using Geometric and Resistive Variations in MRAM Cells. J. Emerg. Technol. Comput. Syst., 13(1):1–15, Dec. 2016. [23] M. Dichtl and J. D. Golić. High-Speed True Random Number Generation with Logic Gates Only. In P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems - CHES 2007, volume 4727, pages 45–62. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007. ISSN: 0302-9743, 1611-3349 Series Title: Lecture Notes in Computer Science. [24] C. Dwork. Differential Privacy. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, Automata, Languages and Programming, volume 4052, pages 1–12. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. Series Title: Lecture Notes in Computer Science. [25] C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating Noise to Sensitivity in Private Data Analysis. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. Halevi, and T. Rabin, editors, Theory of Cryptography, volume 3876, pages 265–284. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. Series Title: Lecture Notes in Computer Science https://people.csail.mit.edu/asmith/PS/sensitivity-tcc-final.pdf. [26] C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating Noise to Sensitivity in Private Data Analysis. JPC, 7(3):17–51, May 2017. [27] C. Dwork and A. Roth. The Algorithmic Foundations of Differential Privacy. FNT in Theoretical Computer Science, 9(3-4):211–407, 2013. https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf. [28] B. Edwards, S. Hofmeyr, S. Forrest, and M. van Eeten. Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. In Proceedings of the 31st Annual Computer Security Applications Conference, pages 391–400, Los Angeles CA USA, Dec. 2015. ACM. [29] Ú. Erlingsson, V. Pihur, and A. Korolova. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 1054–1067, Scottsdale Arizona USA, Nov. 2014. ACM. [30] C. Foreman, S. Wright, A. Edgington, M. Berta, and F. J. Curchod. Practical randomness and privacy amplification. arXiv:2009.06551 [quant-ph], Sept. 2020. arXiv: 2009.06551. [31] S. J. Freedman and J. F. Clauser. Experimental Test of Local Hidden-Variable Theories. Phys. Rev. Lett., 28(14):938–941, Apr. 1972. [32] A. Fukushima, T. Seki, K. Yakushiji, H. Kubota, H. Imamura, S. Yuasa, and K. Ando. Spin dice: A scalable truly random number generator based on spintronics. Appl. Phys. Express, 7(8):083001, Aug. 2014. [33] B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security - CCS ’02, page 148, Washington, DC, USA, 2002. ACM Press. [34] D. González, D. F. de la Pradilla, and G. González. Revisiting the experimental test of Mermin’s inequalities at IBMQ. Int J Theor Phys, 59(12):3756–3768, Dec. 2020. arXiv: 2005.11271. [35] D. M. Greenberger, M. A. Horne, and A. Zeilinger. Going Beyond Bell’s Theorem. arXiv:0712.0921 [quant-ph], Dec. 2007. arXiv: 0712.0921. [36] Z. Gutterman, B. Pinkas, and T. Reinman. Analysis of the Linux random number generator. In 2006 IEEE Symposium on Security and Privacy (S P’06), pages 15 pp.–385, Berkeley/Oakland, CA, 2006. IEEE. [37] B. Hensen, H. Bernien, A. E. Dréau, A. Reiserer, N. Kalb, M. S. Blok, J. Ruitenberg, R. F. L. Vermeulen, R. N. Schouten, C. Abellán, W. Amaya, V. Pruneri, M. W. Mitchell, M. Markham, D. J. Twitchen, D. Elkouss, S. Wehner, T. H. Taminiau, and R. Hanson. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature, 526(7575):682–686, Oct. 2015. [38] C. Herder, M.-D. Yu, F. Koushanfar, and S. Devadas. Physical Unclonable Functions and Applications: A Tutorial. Proc. IEEE, 102(8):1126–1141, Aug. 2014. [39] M. Herrero-Collantes and J. C. Garcia-Escartin. Quantum Random Number Generators. Rev. Mod. Phys., 89(1):015004, Feb. 2017. arXiv: 1604.03304. [40] W. Huang, W. Chien, C. Cho, C. Huang, T. Huang, and C. Chang. Mermin’s inequalities of multiple qubits with orthogonal measurements on IBM Q 53‐qubit system. Quantum Engineering, 2(2), June 2020. [41] W.-J. Huang, W.-C. Chien, C.-H. Cho, C.-C. Huang, T.-W. Huang, S. G. Tan, C. Cao, B. Zeng, and C.-R. Chang. Phase analysis on the error scaling of entangled qubits in a 53-qubit system. Sci Rep, 11(1):14491, Dec. 2021. [42] Jake Edge. Removing the Linux /dev/random blocking pool, Jan. 2020. [43] S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What Can We Learn Privately? SIAM J. Comput., 40(3):793–826, Jan. 2011. [44] J. Kim, A. Chen, B. Behin-Aein, S. Kumar, J.-P. Wang, and C. H. Kim. A technologyagnostic MTJ SPICE model with user-defined dimensions for STT-MRAM scalability studies. In 2015 IEEE Custom Integrated Circuits Conference (CICC), pages 1–4, San Jose, CA, USA, Sept. 2015. IEEE. [45] Le Zhang, Xuanyao Fong, Chip-Hong Chang, Zhi Hui Kong, and K. Roy. Highly Reliable Spin-Transfer Torque Magnetic RAM-Based Physical Unclonable Function With Multi-Response-Bits Per Cell. IEEE Trans.Inform.Forensic Secur., 10(8):1630–1642, Aug. 2015. [46] T. Lunghi, J. B. Brask, C. C. W. Lim, Q. Lavigne, J. Bowles, A. Martin, H. Zbinden, and N. Brunner. A self-testing quantum random number generator. Phys. Rev. Lett., 114(15):150501, Apr. 2015. arXiv: 1410.2790. [47] R. Maes and I. Verbauwhede. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. In A.-R. Sadeghi and D. Naccache, editors, Towards Hardware-Intrinsic Security, pages 3–37. Springer Berlin Heidelberg, Berlin, Heidelberg, 2010. Series Title: Information Security and Cryptography. [48] A. Maiti, V. Gunreddy, and P. Schaumont. A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions. In P. Athanas, D. Pnevmatikatos, and N. Sklavos, editors, Embedded Systems Design with FPGAs, pages 245–267. Springer New York, New York, NY, 2013. [49] S. Meguerdichian and M. Potkonjak. Matched public PUF: Ultra low energy security platform. In IEEE/ACM International Symposium on Low Power Electronics and Design, pages 45–50, Fukuoka, Japan, Aug. 2011. IEEE. [50] N. D. Mermin. Extreme quantum entanglement in a superposition of macroscopically distinct states. Phys. Rev. Lett., 65(15):1838–1840, Oct. 1990. [51] S. Müller. Linux Random Number Generator–A New Approach. 2017. [52] A. Narayanan and V. Shmatikov. Myths and fallacies of ”Personally Identifiable Information”. Commun. ACM, 53(6):24–26, June 2010. https://www.cs.utexas.edu/~shmat/shmat_cacm10.pdf. [53] C. Paar and J. Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer Berlin Heidelberg, Berlin, Heidelberg, 2010. [54] R. Pappu. Physical One-Way Functions. Science, 297(5589):2026–2030, Sept. 2002. [55] S.-Y. Park, S. Lim, D. Jeong, J. Lee, J.-S. Yang, and H. Lee. PUFSec: Device fingerprint-based security architecture for Internet of Things. In IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pages 1–9, Atlanta, GA, USA, May 2017. IEEE. [56] M. Pawlowski and N. Brunner. Semi-device-independent security of one-way quantum key distribution. Phys. Rev. A, 84(1):010302, July 2011. arXiv: 1103.4105. [57] M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. F. Dynes, S. Fasel, S. Fossier, M. Fürst, J.-D. Gautier, O. Gay, N. Gisin, P. Grangier, A. Happe, Y. Hasani, M. Hentschel, H. Hübel, G. Humer, T. Länger, M. Legré, R. Lieger, J. Lodewyck, T. Lorünser, N. Lütkenhaus, A. Marhold, T. Matyus, O. Maurhart, L. Monat, S. Nauerth, J.-B. Page, A. Poppe, E. Querasser, G. Ribordy, S. Robyr, L. Salvail, A. W. Sharpe, A. J. Shields, D. Stucki, M. Suda, C. Tamas, T. Themel, R. T. Thew, Y. Thoma, A. Treiber, P. Trinkler, R. Tualle-Brouri, F. Vannel, N. Walenta, H. Weier, H. Weinfurter, I. Wimberger, Z. L. Yuan, H. Zbinden, and A. Zeilinger. The SECOQC quantum key distribution network in Vienna. New J. Phys., 11(7):075001, July 2009. [58] S. Pironio, A. Acin, S. Massar, A. B. de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe. Random Numbers Certified by Bell’s Theorem. Nature, 464(7291):1021–1024, Apr. 2010. arXiv: 0911.3427. [59] J. Preskill. Quantum Computing in the NISQ era and beyond. Quantum, 2:79, Aug. 2018. [60] M. S. Rahman and M. Hossam-E-Haider. Quantum IoT: A Quantum Approach in IoT Security Maintenance. In 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), pages 269–272, Dhaka, Bangladesh, Jan. 2019. IEEE. [61] D. Rusca, H. Tebyanian, A. Martin, and H. Zbinden. Fast self-testing quantum random number generator based on homodyne detection. Appl. Phys. Lett., 116(26):264004, June 2020. [62] M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J.-B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger. Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express, 19(11):10387, May 2011. [63] Y. Shikano, K. Tamura, and R. Raymond. Detecting Temporal Correlation via Quantum Random Number Generation. Electron. Proc. Theor. Comput. Sci., 315:18–25, Apr. 2020. [64] S. Sinha, G. Yeric, V. Chandra, B. Cline, and Y. Cao. Exploring sub-20nm FinFET design with predictive technology models. In Proceedings of the 49th Annual Design Automation Conference on - DAC ’12, page 283, San Francisco, California, 2012. ACM Press. [65] W. Stahnke. Primitive binary polynomials. Math. Comp., 27(124):977–977, Jan. 1973. [66] S. Z. Syed Idrus, E. Cherrier, C. Rosenberger, and J.-J. Schwartzmann. A Review on Authentication Methods. Australian Journal of Basic and Applied Sciences, 7(5):95– 107, Mar. 2013. [67] R. Tibshirani. Regression Shrinkage and Selection Via the Lasso. Journal of the Royal Statistical Society: Series B (Methodological), 58(1):267–288, Jan. 1996. [68] Y.-T. Tsou, H. Zhen, S.-Y. Kuo, C.-R. Chang, A. Fukushima, and B.-D. Rong. SPARR: Spintronics-based private aggregatable randomized response for crowdsourced data collection and analysis. Computer Communications, 152:8–18, Feb. 2020. [69] P. Vinella. A study of using STT-MRAM as Memory PUF: Design, Modeling and Quality Evaluation. 2015. [70] D. Y. Wang, Y. C. Hsin, K. Y. Lee, G. L. Chen, S. Y. Yang, H. H. Lee, Y. J. Chang, I. J. Wang, Y. C. Kuo, Y. S. Chen, P. H. Wang, C. I. Wu, and D. D. Tang. Hardware implementation of physically unclonable function (puf) in perpendicular STT MRAM. In 2017 International Symposium on VLSI Technology, Systems and Application (VLSI-TSA), pages 1–2, Hsinchu, Taiwan, Apr. 2017. IEEE. [71] S. L. Warner. Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias. Journal of the American Statistical Association, 60(309):63–69, Mar. 1965. [72] E. J. Watson. Primitive polynomials (mod 2). Math. Comp., 16(79):368–368, Sept. 1962. [73] Wei Zhao and Yu Cao. New Generation of Predictive Technology Model for Sub45nm Design Exploration. In 7th International Symposium on Quality Electronic Design (ISQED’06), pages 585–590, San Jose, CA, USA, 2006. IEEE. [74] R. F. Werner and M. M. Wolf. All multipartite Bell correlation inequalities for two dichotomic observables per site. Phys. Rev. A, 64(3):032112, Aug. 2001. arXiv: quant-ph/0102024. [75] T. Xu and M. Potkonjak. Robust and flexible FPGA-based digital PUF. In 2014 24th International Conference on Field Programmable Logic and Applications (FPL), pages 1–6, Munich, Germany, Sept. 2014. IEEE. [76] T. Xu, J. B. Wendt, and M. Potkonjak. Digital bimodal function: An ultra-low energy security primitive. In International Symposium on Low Power Electronics and Design (ISLPED), pages 292–296, Beijing, China, Sept. 2013. IEEE. [77] S. Yu, Z.-B. Chen, J.-W. Pan, and Y.-D. Zhang. Classifying N -Qubit Entanglement via Bell's Inequalities. Phys. Rev. Lett., 90(8):080401, Feb. 2003. [78] M. E. Yuksel. Power Consumption Analysis of a Wi-Fi-based IoT Device. Electrica, 20(1):62–70, Feb. 2020. [79] L. Zhang, X. Fong, C.-H. Chang, Z. H. Kong, and K. Roy. Highly reliable memorybased Physical Unclonable Function using Spin-Transfer Torque MRAM. In 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pages 2169–2172, Melbourne VIC, Australia, June 2014. IEEE. [80] Y. Zhang, H.-P. Lo, A. Mink, T. Ikuta, T. Honjo, H. Takesue, and W. J. Munro. A simple low-latency real-time certifiable quantum random number generator. Nat Commun, 12(1):1056, Dec. 2021.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/80885-
dc.description.abstract隨著雲端運算、邊緣運算等新型態產業正蓬勃發展,令人矚目的物聯網便成為科技社會的革新目標。當前各物聯網的先備條件逐漸備齊,但在物聯網的安全方面卻仍是尚待解決的議題。其中隱私保護及身份認證是物聯網系統須要保證的兩大功能。安全通訊及隱私保護等應用會利用亂數產生器防止個人資訊洩漏,而每一物聯網裝置各自擁有獨立的指紋或防偽標籤能增加物聯網系統安全性。 在本論文中我們首先介紹各種類型的亂數產生器及物理不可複製函數;於第二章將根據差分隱私技術的個人資料可收集隨機響應機制實現於晶片設計;第三章我們則提出了基於物理不可複製函數的物聯網裝置認證協定;最後隨著量子計算進入嘈雜中等規模量子時代,我們透過Mermin不等式實驗,探討量子計算裝置中的隨機性質。zh_TW
dc.description.provenanceMade available in DSpace on 2022-11-24T03:20:28Z (GMT). No. of bitstreams: 1
U0001-2309202113580200.pdf: 7544412 bytes, checksum: ed63959422858f52b7cea1e46b27aeb5 (MD5)
Previous issue date: 2021
en
dc.description.tableofcontents口試委員會審定書 iii 誌謝 v 摘要 vii Abstract ix 1 Introduction 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Random number generator (RNG) . . . . . . . . . . . . . . . . . 2 1.2.2 Physical unclonable function . . . . . . . . . . . . . . . . . . . . 8 2 Privacy-Preserving Reporting Hardware 11 2.1 Privacy-Preserving Reporting Algorithms . . . . . . . . . . . . . . . . . 12 2.1.1 Multilayer Randomized Response . . . . . . . . . . . . . . . . . 13 2.1.2 Differential Privacy of Randomized Responses . . . . . . . . . . 16 2.2 Hardware Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.3 Integrated Circuits Tape-out . . . . . . . . . . . . . . . . . . . . . . . . 19 2.4 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3 STT-Digital PUF-Based Secure Authentication 25 3.1 Design of Digital PUF and STT-MRAM PUF . . . . . . . . . . . . . . . 27 3.1.1 STT-MRAM PUF . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.1.2 Digital PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.2 Authentication Models . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.2.1 Matrix Multiplication Method . . . . . . . . . . . . . . . . . . . 32 3.2.2 Stochastic Logic Method . . . . . . . . . . . . . . . . . . . . . . 33 3.3 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 4 Quantum Randomness 39 4.1 Quantum Random Number Generator . . . . . . . . . . . . . . . . . . . 39 4.2 Mermin Inequalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 4.3 Expectation Value of Observables . . . . . . . . . . . . . . . . . . . . . 42 4.4 Experiments in 53-qubit NISQ Device . . . . . . . . . . . . . . . . . . . 47 4.5 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 5 Conclusion 55 A NIST Report 57 A.1 urandom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 A.2 IBM Vigo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 A.3 SPARR FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 A.4 SPARR IC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 B PPU Spec 77 B.1 Packet Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 B.2 Function List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 B.3 Configuration Registers . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Acronyms 81 Bibliography 85
dc.language.isoen
dc.subject差分隱私zh_TW
dc.subject物理不可複製函數zh_TW
dc.subject自旋轉移力矩磁阻式隨機存取記憶體zh_TW
dc.subjectMermin不等式zh_TW
dc.subject量子糾纏zh_TW
dc.subject亂數產生器zh_TW
dc.subjectRandom number generatoren
dc.subjectMermin inequalitiesen
dc.subjectSTT-MRAMen
dc.subjectPhysical unclonable functionsen
dc.subjectDifferential privacyen
dc.subjectQuantum entanglementen
dc.title隨機性在物聯網及嘈雜中等規模量子時代下之應用zh_TW
dc.titleApplications of Randomness in the Internet of Things and Noisy Intermediate-Scale Quantum Eraen
dc.date.schoolyear109-2
dc.description.degree博士
dc.contributor.author-orcid0000-0003-0140-4616
dc.contributor.oralexamcommittee郭斯彥(Hsin-Tsai Liu),陳政維(Chih-Yang Tseng),陳繩義,鄒耀東,黃琮暐,陳志宇
dc.subject.keyword亂數產生器,差分隱私,物理不可複製函數,自旋轉移力矩磁阻式隨機存取記憶體,Mermin不等式,量子糾纏,zh_TW
dc.subject.keywordRandom number generator,Differential privacy,Physical unclonable functions,STT-MRAM,Mermin inequalities,Quantum entanglement,en
dc.relation.page95
dc.identifier.doi10.6342/NTU202103318
dc.rights.note同意授權(限校園內公開)
dc.date.accepted2021-10-19
dc.contributor.author-college理學院zh_TW
dc.contributor.author-dept應用物理研究所zh_TW
顯示於系所單位:應用物理研究所

文件中的檔案:
檔案 大小格式 
U0001-2309202113580200.pdf
授權僅限NTU校內IP使用(校園外請利用VPN校外連線服務)
7.37 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved