Results 21 to 30 of about 521,610 (289)

A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol] [PDF]

open access: yes, 2004
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet in the near future. However, data security and privacy remain major concerns in the current generation of wireless connectivity.
Jagetia, M, Kocak, T
core   +2 more sources

Hardware-Assisted Security Monitoring Unit for Real-Time Ensuring Secure Instruction Execution and Data Processing in Embedded Systems

open access: yesMicromachines, 2021
The hardware security of embedded systems is raising more and more concerns in numerous safety-critical applications, such as in the automotive, aerospace, avionic, and railway systems.
Xiang Wang   +6 more
doaj   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Consolidating Security Notions in Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer   +2 more
doaj   +1 more source

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens [PDF]

open access: yes, 2015
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in ...
Dowsley, Rafael   +2 more
core   +2 more sources

Design and analysis of hardware Trojans in approximate circuits

open access: yesElectronics Letters, 2022
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou   +4 more
doaj   +1 more source

Hardware Security in Sensor and its Networks

open access: yesFrontiers in Sensors, 2022
Sensor networks and IoT systems have been widely deployed in monitoring and controlling system. With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in ...
Mohammad Mezanur Rahman Monjur   +7 more
doaj   +1 more source

Secure pseudo-random linear binary sequences generators based on arithmetic polynoms

open access: yes, 2014
We present a new approach to constructing of pseudo-random binary sequences (PRS) generators for the purpose of cryptographic data protection, secured from the perpetrator's attacks, caused by generation of masses of hardware errors and faults.
A Omondi   +11 more
core   +1 more source

The Pains of Hardware Security: An Assessment Model of Real-World Hardware Security Attacks

open access: yesIEEE Open Journal of the Industrial Electronics Society
From military applications to everyday devices, hardware (HW) security is more relevant than ever before. The supply chain of integrated circuits is global and involves multiple actors, which facilitate the implementation of various attacks.
Sofia Maragkou   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy