Results 291 to 300 of about 2,442,732 (352)
Some of the next articles are maybe not open access.

Standards for Hardware Security

GetMobile: Mobile Computing and Communications, 2019
Due to the globalization of design, manufacturing and distribution of integrated circuits (ICs), hardware underlying information systems have become increasingly vulnerable to a number of malicious attacks, primarily counterfeiting of ICs and piracy of intellectual properties (IPs).
Ujjwal Guin   +2 more
openaire   +2 more sources

Hardware Security

2014
Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large ...
Rajat Subhra Chakraborty   +1 more
openaire   +2 more sources

What is hardware security?

ACM SIGDA Newsletter, 2010
Historically, the dominant technological and application trends have had a direct impact on the key integrated circuits design metrics. In the 70s, the silicon area was a scarce and expensive commodity. Therefore, development of techniques such as hardware sharing and design simplification was of prime importance. In the 80s, the premier design metrics
Farinaz Koushanfar, Miodrag Potkonjak
openaire   +2 more sources

Invited Tutorial: FPGA Hardware Security for Datacenters and Beyond

Symposium on Field Programmable Gate Arrays, 2020
Since FPGAs are now available in datacenters to accelerate applications, providing FPGA hardware security is a high priority. FPGA security is becoming more serious with the transition to FPGA-as-a-Service where users can upload their own bitstreams ...
Kaspar Matas   +4 more
semanticscholar   +1 more source

Hardware Security and Trust

2017
Since the invention of the first integrated circuit (IC) in 1958 and introduction of first standalone Central Processing Unit (CPU) in 1971, we witnessed and continue to observe the breathtaking advances in IC manufacturing, transistor density and architectural solutions.
Giorgio Di Natale   +3 more
openaire   +2 more sources

Hardware cyber security

Proceedings of the 2014 on International symposium on physical design, 2014
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire   +2 more sources

True Random Number Generator for Reliable Hardware Security Modules Based on a Neuromorphic Variation-Tolerant Spintronic Structure

IEEE transactions on nanotechnology, 2020
The generation of true random numbers is one of the most important tasks in a hardware security module (HSM), particularly for cryptography applications. The stochastic behavior of electronic devices can be used to generate random numbers. In this paper,
Abdolah Amirany   +2 more
semanticscholar   +1 more source

Module-OT: A Hardware Security Module for Operational Technology

2020 IEEE Texas Power and Energy Conference (TPEC), 2020
Increased penetration levels of renewable energy and other types of distributed energy resources (DERs) on the modern electric grid-combined with technological advancements for electric system monitoring and control-introduce new cyberattack vectors and ...
W. Hupp   +3 more
semanticscholar   +1 more source

Hardware Security Modules

2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire   +2 more sources

Nanoelectronics and Hardware Security

2013
In recent years, the field of nanoelectronics has yielded several nanoscale device families that exhibit the high device densities and energy-efficient operation required for emerging integrated circuit applications. For example, the memristor (or “memory resistor”) is a two-terminal nanoelectronic switch particularly well suited for applications such ...
Bryant Wysocki   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy