Results 21 to 30 of about 776,400 (220)

An Efficient Algorithm and Architecture for the VLSI Implementation of Integer DCT That Allows an Efficient Incorporation of the Hardware Security with a Low Overhead

open access: yesApplied Sciences, 2023
In this paper, we propose a new hardware algorithm for an integer based discrete cosine transform (IntDCT) that was designed to allow an efficient VLSI implementation of the discrete cosine transform using the systolic array architectural paradigm.
Doru Florin Chiper, Arcadie Cracan
doaj   +1 more source

Program Obfuscation with Leaky Hardware [PDF]

open access: yes, 2011
We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky.
Bitansky, Nir   +5 more
openaire   +3 more sources

Resource Centric Analysis of RSA and ECC Algorithms on FPGA [PDF]

open access: yesITM Web of Conferences, 2023
The electronics industry’s shadow side is counterfeiting, and the doom is growing. Almost every business in the supply chain is impacted by the issue, including component suppliers, distributors, Electronics Manufacturing Services (EMS) providers ...
Sudarshan Deeksha   +4 more
doaj   +1 more source

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +1 more source

From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains

open access: yesIEEE Access, 2021
The availability of access to Integrated Circuits’ scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs.
Kimia Zamiri Azar   +3 more
doaj   +1 more source

Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]

open access: yes, 2012
Non peer ...
Bisdikian, Chatschik   +3 more
core   +1 more source

Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak   +2 more
doaj   +1 more source

Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware

open access: yesIEEE Access, 2019
Digital signal processing (DSP) kernel-based intellectual property (IP) core forms an integral ingredient of consumer electronics devices. Thus, protection of these IP cores against reverse engineering attack is crucial.
Anirban Sengupta, Mahendra Rathor
doaj   +1 more source

Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems

open access: yesIEEE Access, 2020
In modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate ...
Anirban Sengupta, Mahendra Rathor
doaj   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy