Secure Multi-Source Key Dissemination Using Network Coding
A secure key-cast network design to ensure positive-rate key dissemination while preventing non-terminal nodes from accessing information.
Background:
In cryptographic applications, disseminating a secret key among network nodes while ensuring that non-terminal nodes do not gain any information about the key is a critical challenge. This concept,...
Published: 11/12/2024
|
Inventor(s): Michael Langberg, Michelle Effros
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Information Technology
|
Delta-Sigma Modulator Enabled Variable-Input Resolution In-Memory Computing SRAM Macro
An SRAM based IMC with higher linearity than the state of the art using delta-sigma modulators.
Background:
SRAM based IMC has gained significant attention due to its high energy efficiency and easy integration with CMOS ICs. A fundamental limitation of SRAM based IMC is nonlinearity in the multiply-and-accumulate (MAC) operation. For large...
Published: 5/24/2024
|
Inventor(s): Arindam Sanyal, Jae-sun Seo, Vasundhara Damodaran, Ziyu Liu
Keywords(s): Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Electronics, Technology Classifications > Energy Conservation
|
Methods for Making Large-area, Free-standing Poly-crystalline Diamond Films
Low cost methods to produce poly-crystalline diamond (PCD) membranes with adjustable dimensions for use in electronic/mechanical/optoelectronic devices.
Background:
Due to its unique combination of outstanding physical and chemical properties, such as wide band-gap, chemical inertness, the highest hardness and thermal conductivity, negative electron...
Published: 10/17/2024
|
Inventor(s): Jung-Hun Seo, Matthias Muehle, Dmitry Shinyavskiy
Keywords(s): Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Electronics, Technology Classifications > Computers
|
Optimized Trusted Execution Environments for FPGAs with Enhanced Security
Systems and methods for creating a custom trusted execution environment (TEE) for FPGAs with isolated memory and cache in order to protect keys against side-channel attacks.
Background:
FPGAs are commonly used by high-security industries while being particularly vulnerable to side-channel attacks. Intel SGX and Arm TrustZone are two hardware TEE...
Published: 2/2/2024
|
Inventor(s): Ziming Zhao, Md Armanuzzaman
Keywords(s): Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Electronics, Technology Classifications > Computers
|
Methods for Multicast Key-Capacity
A means of protecting a multi-source multi-terminal noiseless network, with key-dissemination in which secret key K is multicasted from the network sources to its terminals.
Background:
A key-dissemination communication protocol is one in which a key K, which is at times secret, is shared among a collection of users as a prelude to future communication...
Published: 6/20/2024
|
Inventor(s): Michael Langberg, Michelle Effros
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Information Technology
|
Dative Epitaxy - Growing Semiconductor Materials on vdW Templates
This is a distinct form of thin film epitaxy utilizing dative bonds used to grow semiconductor crystals with single unit cell thickness on a thin layer vdW template.
Background:
Two-dimensional (2D) semiconductors are the core force of next-generation electronics and optoelectronics, which are expected to exhibit quantum effect and greatly improve...
Published: 10/23/2024
|
Inventor(s): Hao Zeng, Mengying Bian
Keywords(s): Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Materials and Chemicals, Technology Classifications > Computers
|
Quantum Sensing Using Entangled Photons and Phonons
A quantum semiconductor design that opens up the possibility of realizing novel devices in which electron-phonon coupling is exploited to generate single phonons on-demand.
Background:
Hot carriers in semiconductor devices may lose energy efficiently through the emission of phonons. In 2D materials, the phonon energies (100-200 meV) can be well...
Published: 10/17/2024
|
Inventor(s): Vasili Perebeinos, Jonathan Bird, Huamin Li
Keywords(s): Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Electronics, Technology Classifications > Computers, Technology Classifications > Sensors
|
Cardiac Scan: Continuous Computer User Authentication
Continuous computer user authentication is achieved using DC-coupled continuous-wave radar images of the user's unique cardiac motion signature.
Background:
Continuous authentication improves upon one-pass validation by continuously verifying over the lifetime of a session that the system is operated by the same user as at initial login....
Published: 6/12/2024
|
Inventor(s): Wenyao Xu, Changzhi Li
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Technology Classifications > Information Technology, Technology Classifications > Sensors, Campus > University at Buffalo
|
Communication Efficient Secret Sharing
Methods for distributed data storage that enable secret sharing.
A secret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. The key idea to reduce communication is to let the user...
Published: 2/2/2024
|
Inventor(s): Michael Langberg, Wentao Huang, Joerg Kliewer, Jehoshua Bruck
Keywords(s): Technologies
Category(s): Technology Classifications > Information Technology, Technology Classifications > Computers, Campus > University at Buffalo
|
Spin XOR Gate in Ferromagnet-Nonmagnet Heterostructures
A device capable of combining non-volatile memory with spin based-processing to dramatically increase processing speed and lower the power requirement of many CMOS logic gates.
Current data search devices rely on complementary metal-oxide semiconductor (CMOS) technology. Although CMOS has long been the gold standard, it is limited by the number...
Published: 7/11/2024
|
Inventor(s): Igor Zutic, Roland Kawakami, Hanan Dery, Ilya Krivorotov, Lu Sham, Jing Shi, Hua Wen
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Campus > University at Buffalo
|