نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2007
Guerric Meurice de Dormale

In an ever-increasing digital world, the need for secure communications over unsecured channels like Internet has exploded. To meet the different security requirements, communication devices have to perform computationally-intensive cryptographic operations. Hardware processor or co-processor are therefore often needed to meet goals such as speed, ubiquity or cost-effectiveness. For such device...

2006
Masayuki Yoshino Katsuyuki Okeya Camille Vuillaume

We present a novel approach for computing 2n-bit Montgomery multiplications with n-bit hardware Montgomery multipliers. Smartcards are usually equipped with such hardware Montgomery multipliers; however, due to progresses in factoring algorithms, the recommended bit length of public-key schemes such as RSA is steadily increasing, making the hardware quickly obsolete. Thanks to our doublesize te...

Journal: :IJDTIS 2010
Jan-Erik Ekberg

Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to t...

Journal: :CoRR 2010
Tatini Mal-Sarkar Swarup Bhunia

With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats [1]. There are two major modes of threats for mobile wireless devices hardware and software. In the hardware field, many thr...

2017

Laser allows attackers to realize very efficient attacks which threaten the security of digital systems [FA06]. These attacks consist in using a laser to inject errors at specific times targeting specific components in the digital system. This digital system is a hardware architecture which executes a software application. The injected errors can then be propagated or masked, both by the hardwa...

2006
N. SKLAVOS K. TOULIOU

Cryptographic modules can be implemented in both hardware and software. Although software cryptographic implementations are cost-effective and more flexible, they seem to provide a much lower level of security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilities imposed by the OS and the facility of modifying software implementations are some of the sec...

Journal: :Eurasip Journal on Wireless Communications and Networking 2022

Abstract Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to globalization IC design manufacturing. Malicious circuits, also known as hardware Trojans, are found able degrade performance or even leak confidential information, accordingly it is definitely an immediate concern develop detection techniques against Trojans. This paper presents...

Journal: :IEEE design & test 2022

The articles in this issue are divided into two groups: 1) the first group belongs to Special Issue on 2021 Top Picks in Hardware and Embedded Security 2) secon...

2003
Seth Schoen

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید