We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques

    Cryptographic devices have many encrypted and secured solutions to protect them against hardware attacks. Hardware designers spent huge amount of...

    Shaminder Kaur, Balwinder Singh, Harsimranjit Kaur in SN Computer Science
    Article 31 March 2021
  2. Protecting Private Keys of Dilithium Using Hardware Transactional Memory

    The confidentiality of cryptography keys is necessary in cryptographic implementations. In order to resist memory disclosure attacks that steal...
    Lingjia Meng, Yu Fu, ... **gqiang Lin in Information Security
    Conference paper 2023
  3. Using Analog Side Channels to Attack Cryptographic Implementations

    This chapter overviews analog side-channel attacks on recent implementations of the two most popular public-key cryptography approaches, namely...
    Chapter 2023
  4. Unclonable Polymers and Their Cryptographic Applications

    We propose a mechanism for generating and manipulating protein polymers to obtain a new type of consumable storage that exhibits intriguing...
    Ghada Almashaqbeh, Ran Canetti, ... Eran Tromer in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  5. Fast and Efficient Hardware Implementation of HQC

    This work presents a hardware design for constant-time implementation of the HQC (Hamming Quasi-Cyclic) code-based key encapsulation mechanism. HQC...
    Sanjay Deshpande, Chuanqi Xu, ... Jakub Szefer in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  6. Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection

    Current hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are...

    Amin Sarihi, Ahmad Patooghy, ... Abdel-Hameed A. Badawy in The Journal of Supercomputing
    Article 18 March 2024
  7. An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC

    RSA and ellipse curve cryptography (ECC) algorithms are widely used in authentication, data security, and access control. In this paper, we analyze...

    Mengni Bie, Wei Li, ... Danyang Yang in Frontiers of Information Technology & Electronic Engineering
    Article 01 January 2022
  8. Cryptographic Techniques

    In order to establish a secure communication between two or multiple entities specific protocols need to be followed. To provide security the...
    Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari in Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography
    Chapter 2021
  9. PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare

    This article presents the first-ever hardware-assisted blockchain for simultaneously handling device and data security in smart healthcare. This...

    Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, ... Bibhudutta Rout in SN Computer Science
    Article 20 June 2022
  10. Hardware Trojan

    Steffen Becker, Christof Paar in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2023
  11. Decomposition of Dillon’s APN Permutation with Efficient Hardware Implementation

    Modern block ciphers incorporate a vectorial Boolean function (S-box) as their only nonlinear component. Almost Perfect Nonlinear (APN) functions...
    José L. Imaña, Lilya Budaghyan, Nikolay Kaleyski in Arithmetic of Finite Fields
    Conference paper 2023
  12. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing

    Trusted Computing Platform (TCP) using Trusted Platform Module (TPM) cryptographic microcontroller system was introduced by the Trusted Computing...
    Umashankar Rawat, Satyabrata Roy, ... Krishna Kumar in Cyber Warfare, Security and Space Research
    Conference paper 2022
  13. On-Demand Allocation of Cryptographic Computing Resource with Load Prediction

    “Cryptography-as-a-Service” provides convenience for users to request cryptographic computing resources according to their needs. However, it also...
    **aogang Cao, Fenghua Li, ... Wenlong Kou in Information and Communications Security
    Conference paper 2023
  14. Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)

    The threat of (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an (ASIC) can be considered...

    Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik in Journal of Cryptographic Engineering
    Article Open access 29 May 2023
  15. How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs

    The development of Artificial Intelligence (AI) based systems to automatically generate hardware systems has gained an impulse that aims to...
    Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay in Cyber Security, Cryptology, and Machine Learning
    Conference paper 2023
  16. A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

    Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more...

    Rijoy Mukherjee, Sree Ranjani Rajendran, Rajat Subhra Chakraborty in Journal of Cryptographic Engineering
    Article 16 July 2022
  17. NoC-based hardware software co-design framework for dataflow thread management

    Applications running in a large and complex manycore system can significantly benefit from adopting the dataflow model of computation. In a dataflow...

    Somnath Mazumdar, Alberto Scionti, ... Antoni Portero in The Journal of Supercomputing
    Article Open access 11 May 2023
  18. Formal Verification of Arithmetic Masking in Hardware and Software

    Masking is a popular countermeasure to protect cryptographic implementations against physical attacks like differential power analysis. So far,...
    Barbara Gigerl, Robert Primas, Stefan Mangard in Applied Cryptography and Network Security
    Conference paper 2023
Did you find what you were looking for? Share feedback.