User authentication without ROM: demo Similar throughput and adequate security may be achieved without ROM