Results 21 to 30 of about 10,775 (222)

An Efficient Algorithm and Architecture for the VLSI Implementation of Integer DCT That Allows an Efficient Incorporation of the Hardware Security with a Low Overhead

open access: yesApplied Sciences, 2023
In this paper, we propose a new hardware algorithm for an integer based discrete cosine transform (IntDCT) that was designed to allow an efficient VLSI implementation of the discrete cosine transform using the systolic array architectural paradigm.
Doru Florin Chiper, Arcadie Cracan
doaj   +1 more source

FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]

open access: yes, 2012
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo   +2 more
core   +1 more source

Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware

open access: yesIEEE Access, 2019
Digital signal processing (DSP) kernel-based intellectual property (IP) core forms an integral ingredient of consumer electronics devices. Thus, protection of these IP cores against reverse engineering attack is crucial.
Anirban Sengupta, Mahendra Rathor
doaj   +1 more source

Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak   +2 more
doaj   +1 more source

From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains

open access: yesIEEE Access, 2021
The availability of access to Integrated Circuits’ scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs.
Kimia Zamiri Azar   +3 more
doaj   +1 more source

Resource Centric Analysis of RSA and ECC Algorithms on FPGA [PDF]

open access: yesITM Web of Conferences, 2023
The electronics industry’s shadow side is counterfeiting, and the doom is growing. Almost every business in the supply chain is impacted by the issue, including component suppliers, distributors, Electronics Manufacturing Services (EMS) providers ...
Sudarshan Deeksha   +4 more
doaj   +1 more source

Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems

open access: yesIEEE Access, 2020
In modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate ...
Anirban Sengupta, Mahendra Rathor
doaj   +1 more source

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

On the Security Goals of White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy