نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2008
Kevin Schutz

This presentation discusses the role of platform integrity in platform security trustworthiness while reviewing a few basic tenants for hardware requirements to enable and support successful applications. Users demand that applications and platforms strike a delicate balance between hardware and software utility. Platforms, and their associated applications, that are too difficult or complex fo...

2013
Justin King-Lacroix

The Web has become the platform of choice for providing services to users in a range of different environments. These services can have drastically differing security requirements; for more sensitive services, it is attractive to take advantage of the wide deployment of secure hardware in the consumer space. However, the applicability of that hardware to any given security problem is not always...

2006
Boris Köpf David A. Basin

Timing side channels are a serious threat to the security of cryptographic algorithms. This paper presents a novel method for the timing-sensitive analysis of information flow in synchronous hardware circuits. The method is based on a parameterized notion of confidentiality for finite transition systems that allows one to model information leakage in a fine-grained way. We present an efficient ...

Journal: :IEEE Access 2022

With the advancement of beyond CMOS devices, a new approach to utilize inherent physics such emerging structures for various applications is great interest in recent research. Spintronics-based devices offer key advantages like ease fabrication with Si-substrate, non-volatile memory, low operational voltage, and non-linear device characteristics, which have shown potential several fields study....

Journal: :International journal of Computer Networks & Communications 2018

2002
Thomas Wollinger

Security issues play an important role in almost all modern communication and computer networks. The foundation of IT security are cryptographic systems, for example hyperelliptic curves cryptosystems (HECC). The advantage of HECC is that they allow encryption with shorter operands and at the same time, they provide the same level of security as other public-key cryptosystems, based on the inte...

2012
Bruno Robisson Hélène Le Bouder Jean-Max Dutertre Assia Tria

Security is a key component for information technologies and communication. Security is a very large research area involved in the whole information technology, related to both hardware and software. This paper focuses on hardware security, and more specifically on hardware cryptanalysis whose aim is to extract confidential information (such as encryption keys) from cryptographic circuits. Many...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید