Results 171 to 180 of about 263,653 (212)
Some of the next articles are maybe not open access.

Improving security in information technology using cryptographic hardware modules

Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology, 2003
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc.
R. Sanchez-Reillo   +3 more
openaire   +1 more source

Poster: Hardware Security for IoT Wireless Network

IEEE Conference on Network Softwarization
This composition describes an Internet of Things (IoT) system designed for applications typical to the construction industry, focusing on the protection of IoT devices against hardware attacks.
Uday Kiran Sunkara   +3 more
semanticscholar   +1 more source

Memristor-Based AES Key Generation for Low Power IoT Hardware Security Modules

Midwest Symposium on Circuits and Systems, 2019
Security of Internet of Things (IoT) needs devices and algorithms that offer ultra-low power consumption and a long lifespan, alongside strong immunity against attacks, lower chip area, and acceptable throughput.
Hanan Rady   +3 more
semanticscholar   +1 more source

Secure AES Hardware Module for Resource Constrained Devices

2005
Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices’ resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an
Elena Trichina, Tymur Korkishko
openaire   +1 more source

Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs

IEEE Transactions on Information Forensics and Security
The security and privacy challenges faced by Vehicular Ad hoc Networks (VANETs) have led to the development of conditional privacy-preserving authentication (CPPA) schemes.
Zihou Zhang   +4 more
semanticscholar   +1 more source

Design and LSI prototyping of security module with hardware trojan

2015 IEEE International Conference on Consumer Electronics (ICCE), 2015
To examine the tamper resistance of consumer security products using cryptographic circuits, the present study develops countermeasure-annulled hardware Trojan and manufactures its prototyping as ASIC using 018 um CMOS. The present study also verifies the validity and effect of the hardware Trojan on the prototyping LSI by performing evaluation tests.
Masaya Yoshikawa   +2 more
openaire   +1 more source

Notice of Retraction Analysis of hardware security for cryptographical module

2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013
FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Haitao Sun, Jie Liu, Deqing Xue
openaire   +1 more source

Efficient Hardware Implementation of the Lightweight CRYSTALS-Kyber

IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Quantum computing raises questions about the security of data encrypted using modern methods. Hence, the National Institute of Standards and Technology (NIST) has undertaken standardization of post-quantum cryptography (PQC) algorithms to defend against ...
Trong-Hung Nguyen   +5 more
semanticscholar   +1 more source

Understanding Hardware Security Modules (HSMs) for Blockchain and Cryptocurrency Security

Abstract Hardware Security Modules (HSMs) are purpose‑built devices that safeguard cryptographic keys and accelerate secure operations. In the context of blockchain and cryptocurrency, HSMs provide tamper‑resistant key storage, deterministic signing, and compliance with industry standards, thereby reducing the attack surface of wallets, exchanges, and
openaire   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

Home - About - Disclaimer - Privacy