نتایج جستجو برای: hardware security
تعداد نتایج: 279905 فیلتر نتایج به سال:
In an ever-increasing digital world, the need for secure communications over unsecured channels like Internet has exploded. To meet the different security requirements, communication devices have to perform computationally-intensive cryptographic operations. Hardware processor or co-processor are therefore often needed to meet goals such as speed, ubiquity or cost-effectiveness. For such device...
We present a novel approach for computing 2n-bit Montgomery multiplications with n-bit hardware Montgomery multipliers. Smartcards are usually equipped with such hardware Montgomery multipliers; however, due to progresses in factoring algorithms, the recommended bit length of public-key schemes such as RSA is steadily increasing, making the hardware quickly obsolete. Thanks to our doublesize te...
Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to t...
With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats [1]. There are two major modes of threats for mobile wireless devices hardware and software. In the hardware field, many thr...
Laser allows attackers to realize very efficient attacks which threaten the security of digital systems [FA06]. These attacks consist in using a laser to inject errors at specific times targeting specific components in the digital system. This digital system is a hardware architecture which executes a software application. The injected errors can then be propagated or masked, both by the hardwa...
Cryptographic modules can be implemented in both hardware and software. Although software cryptographic implementations are cost-effective and more flexible, they seem to provide a much lower level of security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilities imposed by the OS and the facility of modifying software implementations are some of the sec...
Abstract Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to globalization IC design manufacturing. Malicious circuits, also known as hardware Trojans, are found able degrade performance or even leak confidential information, accordingly it is definitely an immediate concern develop detection techniques against Trojans. This paper presents...
The articles in this issue are divided into two groups: 1) the first group belongs to Special Issue on 2021 Top Picks in Hardware and Embedded Security 2) secon...
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید