Hardware Security database (HWsecdb)

Database of Silicon Primitives for Hardware Security (HWsecdb)
The HWsecdb database collects thorough and up-to-date information on state-of-the-art silicon demonstrations of primitives for hardware security, and related performance figures.
We hope this will be useful to our community, help keep track of the continuous advances and acknowledge the fine work of our colleagues who push the boundaries in the field.
Silicon demonstrations from leading journals and conferences in the circuits area are being tracked for the following primitives:
  • Physically Unclonable Functions (PUF)
  • True Random Numbers Generators (TRNG)
  • private-key cryptographic engines
  • public key cryptographic engines
  • other cryptographic engines (e.g., hashing, key exchange, digital signature)
  • defense mechanisms to counteract physical attacks.

HWsecdb spreadsheet
You can download the spreadsheet containing the HWsecdb here (updated on Aug 29, 2021).
The spreadsheed also includes the analysis of trends (e.g., energy, area), as well as the previously available PUF database (now superseded by the HWsecdb database).

For use in publications and presentations please cite this data collection as follows:
M. Alioto, S. Taneja, “HW security primitives Green IC database," [Online]. Available: http://www.green-ic.org/hwsecdb

For authors of new primitives for HW security and papers with experimental validation
Authors of new primitives who wish their silicon demonstrations to be included in the future revisions of this database can send an email to Prof. Alioto and attach the following pieces of information:
  • reference of the publication presenting the primitive
  • performance and numerical data based on the figures of merit used in the above spreadsheet.
Any comment/suggestion on how to improve this page and the spreadsheet is welcome.

Exploring further
As further sources of information, please refer to: