Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks [PDF]
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez +5 more
doaj +4 more sources
Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration [PDF]
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami +9 more
doaj +4 more sources
Hardware Security Module [PDF]
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
Maria Sommerhalder
openalex +2 more sources
A Formally Verified Configuration for Hardware Security Modules in the Cloud [PDF]
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every ...
Riccardo Focardi, Flaminia L. Luccio
openalex +4 more sources
A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory [PDF]
Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher ...
Bohan Lin +5 more
doaj +2 more sources
Hardware-based Security for Virtual Trusted Platform Modules [PDF]
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Sami Alsouri +3 more
openalex +3 more sources
Design of programmable hardware security modules for enhancing blockchain based security framework
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP ...
Devika Kalathil Nandalal +1 more
openalex +3 more sources
Electronic Voting Using Identity Domain Separation and Hardware Security Modules [PDF]
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed.
Thomas Rößler
openalex +2 more sources
The K2 Architecture for Trustworthy Hardware Security Modules [PDF]
Anish Athalye +3 more
openalex +3 more sources
Ceremonies Design for PKI's Hardware Security Modules
Ceremonies are a useful tool to HSMs in PKI environments. They state operational procedures and usage scenarios. Their correct construction can lead to a safer operation. This paper presents basic ceremony procedures to manage the life cycle of cryptographic keys and ideas of requirements needed to assure security throughout the usage of ceremonies in ...
Jean Everson Martina +2 more
openalex +3 more sources

