Search
Search Results
-
Universal Gaussian elimination hardware for cryptographic purposes
In this paper, we investigate the possibility of performing Gaussian elimination for arbitrary binary matrices on hardware. In particular, we...
-
Designing hardware for a robust high-speed cryptographic key generator based on multiple chaotic systems and its FPGA implementation for real-time video encryption
Recent advancements in communication technologies have highlighted the pivotal role of information security for all individuals and entities. In...
-
Cryptographic Security Through a Hardware Root of Trust
This work presents a novel approach to a Hardware Root-of-Trust that leverages System-on-Chip technology for the implementation of hardware... -
Cryptographic Competitions
Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...
-
A novel trusted hardware-based scalable security framework for IoT edge devices
The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT...
-
Energy Consumption of Protected Cryptographic Hardware Cores
The rapid deployment of the Internet of Things (IoT) brought some interesting topics into the spotlight, one of which is low-power design. IoT... -
Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
Intellectual Property (IP) core has evolved into a primary component of System-on-Chip (SoC). They address and implement a wide range of hardware...
-
Formalized High Level Synthesis with Applications to Cryptographic Hardware
Verification of hardware-based cryptographic accelerators connects a low-level RTL implementation to the abstract algorithm itself; generally, the... -
Enhancing the cryptographic key using sample entropy and whale optimization algorithm
Internet-of-Things (IoT) is one of the most rapidly develo** technologies of the twenty-first century. With the invention of 5G technology and the...
-
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit
Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical...
-
RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices
IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...
-
WAS: improved white-box cryptographic algorithm over AS iteration
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution...
-
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems
The significant effort in the research and design of large-scale quantum computers has spurred a transition to post-quantum cryptographic primitives...
-
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA
In sensitive communications, the cryptographic hash function plays a crucial role, including in the military, healthcare, and banking, ensuring...
-
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
Deep learning-based biometric cryptographic key generation with post-quantum security
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...
-
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
Abstract—This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to...
-
Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations
Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...
-
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors
Platforms are nowadays typically equipped with trusted execution environments (TEEs), such as Intel SGX or ARM TrustZone. However, recent... -
Securing edge computing using cryptographic schemes: a review
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...