Results 21 to 30 of about 526,457 (288)
Hardware Security of the Controller Area Network (CAN Bus) [PDF]
The CAN bus is a multi-master network messaging protocol that is a standard across the vehicular industry to provide intra-vehicular communications. Electronics Control Units within vehicles use this network to exchange critical information to operate ...
Satagaj, David
core +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems.
Balfanz D. +6 more
core +1 more source
Consolidating Security Notions in Hardware Masking
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer +2 more
doaj +1 more source
Сryptocurrency and Internet of Things: Problems of Implementation and Realization [PDF]
IoT (Internet of Things) requires the implementation of digital encryption of information, transaction support and recording of all events for security. It can provide cryptocurrencies protocols with adding an additional possibility of payments.
Kopytko, Vasyl +4 more
core +2 more sources
A new Definition and Classification of Physical Unclonable Functions
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core +1 more source
HardIDX: Practical and Secure Index with SGX [PDF]
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva +13 more
core +4 more sources
Hardware Security in Sensor and its Networks
Sensor networks and IoT systems have been widely deployed in monitoring and controlling system. With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in ...
Mohammad Mezanur Rahman Monjur +7 more
doaj +1 more source
Hardware Trojan Detection through Information Flow Security Verification
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo +5 more
core +1 more source
Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses [PDF]
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power.
Fujiwara, Mikio +9 more
core +3 more sources

