{"title":"Resistive Memory for Computing and Security: Algorithms, Architectures, and Platforms","authors":"Simranjeet Singh, Farhad Merchant, Sachin Patkar","doi":"arxiv-2407.03843","DOIUrl":null,"url":null,"abstract":"Resistive random-access memory (RRAM) is gaining popularity due to its\nability to offer computing within the memory and its non-volatile nature. The\nunique properties of RRAM, such as binary switching, multi-state switching, and\ndevice variations, can be leveraged to design novel techniques and algorithms.\nThis thesis proposes a technique for utilizing RRAM devices in three major\ndirections: i) digital logic implementation, ii) multi-valued computing, and\niii) hardware security primitive design. We proposed new algorithms and\narchitectures and conducted \\textit{experimental studies} on each\nimplementation. Moreover, we developed the electronic design automation\nframework and hardware platforms to facilitate these experiments.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"367 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.03843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Resistive random-access memory (RRAM) is gaining popularity due to its
ability to offer computing within the memory and its non-volatile nature. The
unique properties of RRAM, such as binary switching, multi-state switching, and
device variations, can be leveraged to design novel techniques and algorithms.
This thesis proposes a technique for utilizing RRAM devices in three major
directions: i) digital logic implementation, ii) multi-valued computing, and
iii) hardware security primitive design. We proposed new algorithms and
architectures and conducted \textit{experimental studies} on each
implementation. Moreover, we developed the electronic design automation
framework and hardware platforms to facilitate these experiments.