Skip to product information
Using Imperfect Semiconductor Systems for Unique Identification (Softcover Reprint of the Original 1st 2017)

Using Imperfect Semiconductor Systems for Unique Identification (Softcover Reprint of the Original 1st 2017)

$109.99
Shipping calculated at checkout.
  • Authorized Dealer
  • Ships within 1 business day
  • Free 30-Day Returns
  • Secure Checkout via Shopify Payments
Details
This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.

Materials + Care

We prioritize quality in selecting the materials for our items, choosing premium fabrics and finishings that ensure durability, comfort, and timeless appeal.

Shipping + Returns

We strive to process and ship all orders in a timely manner, working diligently to ensure that your items are on their way to you as soon as possible.

This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.

Technical specifications will appear here (sensor size, threads, backfocus, materials, etc.).

I have no manuals to link to this area.

Frequently asked questions about this product will appear here.

Shop by collection

You might also like...