We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Universal Gaussian elimination hardware for cryptographic purposes

    In this paper, we investigate the possibility of performing Gaussian elimination for arbitrary binary matrices on hardware. In particular, we...

    **gwei Hu, Wen Wang, ... Huaxiong Wang in Journal of Cryptographic Engineering
    Article 22 May 2024
  2. Designing hardware for a robust high-speed cryptographic key generator based on multiple chaotic systems and its FPGA implementation for real-time video encryption

    Recent advancements in communication technologies have highlighted the pivotal role of information security for all individuals and entities. In...

    Esra İnce, Barış Karakaya, Mustafa Türk in Multimedia Tools and Applications
    Article Open access 16 January 2024
  3. Cryptographic Security Through a Hardware Root of Trust

    This work presents a novel approach to a Hardware Root-of-Trust that leverages System-on-Chip technology for the implementation of hardware...
    Luis F. Rojas-Muñoz, Santiago Sánchez-Solano, ... Piedad Brox in Applied Reconfigurable Computing. Architectures, Tools, and Applications
    Conference paper 2024
  4. Cryptographic Competitions

    Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...

    Daniel J. Bernstein in Journal of Cryptology
    Article Open access 08 December 2023
  5. A novel trusted hardware-based scalable security framework for IoT edge devices

    The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT...

    Mohd Khan, Mohsen Hatami, ... Yu Chen in Discover Internet of Things
    Article Open access 27 April 2024
  6. Energy Consumption of Protected Cryptographic Hardware Cores

    The rapid deployment of the Internet of Things (IoT) brought some interesting topics into the spotlight, one of which is low-power design. IoT...
    Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2023
  7. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications

    Intellectual Property (IP) core has evolved into a primary component of System-on-Chip (SoC). They address and implement a wide range of hardware...

    Surbhi Chhabra, Kusum Lata in SN Computer Science
    Article 23 May 2022
  8. Formalized High Level Synthesis with Applications to Cryptographic Hardware

    Verification of hardware-based cryptographic accelerators connects a low-level RTL implementation to the abstract algorithm itself; generally, the...
    William Harrison, Ian Blumenfeld, ... Jared Ziegler in NASA Formal Methods
    Conference paper 2023
  9. Enhancing the cryptographic key using sample entropy and whale optimization algorithm

    Internet-of-Things (IoT) is one of the most rapidly develo** technologies of the twenty-first century. With the invention of 5G technology and the...

    Md Saquib Jawed, Mohammad Sajid in International Journal of Information Technology
    Article 03 October 2023
  10. Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit

    Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical...

    Cui** Shao, Dongyan Zhao, ... Liuqing Yang in Journal of Cryptographic Engineering
    Article 02 June 2023
  11. RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices

    IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...

    Shreyas Srinath, G. S. Nagaraja in SN Computer Science
    Article 28 June 2024
  12. WAS: improved white-box cryptographic algorithm over AS iteration

    The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution...

    Yatao Yang, Yuying Zhai, ... Yanshuo Zhang in Cybersecurity
    Article Open access 08 December 2023
  13. Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems

    The significant effort in the research and design of large-scale quantum computers has spurred a transition to post-quantum cryptographic primitives...

    Francesco Antognazza, Alessandro Barenghi, ... Ruggero Susella in SN Computer Science
    Article Open access 20 January 2024
  14. Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

    In sensitive communications, the cryptographic hash function plays a crucial role, including in the military, healthcare, and banking, ensuring...

    Argyrios Sideris, Theodora Sanida, Minas Dasygenis in Journal of Cryptographic Engineering
    Article Open access 30 August 2023
  15. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  16. Deep learning-based biometric cryptographic key generation with post-quantum security

    In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...

    Oleksandr Kuznetsov, Dmytro Zakharov, Emanuele Frontoni in Multimedia Tools and Applications
    Article 14 December 2023
  17. Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet

    Abstract—

    This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to...

    P. V. Semyanov, S. V. Grezina in Automatic Control and Computer Sciences
    Article 01 December 2023
  18. Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

    Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...

    Rim Amdouni, Mohamed Gafsi, ... Abdellatif Mtibaa in Multimedia Tools and Applications
    Article 18 March 2023
  19. TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors

    Platforms are nowadays typically equipped with trusted execution environments (TEEs), such as Intel SGX or ARM TrustZone. However, recent...
    Dhiman Chakraborty, Michael Schwarz, Sven Bugiel in Financial Cryptography and Data Security
    Conference paper 2024
  20. Securing edge computing using cryptographic schemes: a review

    The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in Multimedia Tools and Applications
    Article 27 September 2023
Did you find what you were looking for? Share feedback.