Results 171 to 180 of about 263,653 (212)
Some of the next articles are maybe not open access.
Improving security in information technology using cryptographic hardware modules
Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology, 2003It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc.
R. Sanchez-Reillo +3 more
openaire +1 more source
Poster: Hardware Security for IoT Wireless Network
IEEE Conference on Network SoftwarizationThis composition describes an Internet of Things (IoT) system designed for applications typical to the construction industry, focusing on the protection of IoT devices against hardware attacks.
Uday Kiran Sunkara +3 more
semanticscholar +1 more source
Memristor-Based AES Key Generation for Low Power IoT Hardware Security Modules
Midwest Symposium on Circuits and Systems, 2019Security of Internet of Things (IoT) needs devices and algorithms that offer ultra-low power consumption and a long lifespan, alongside strong immunity against attacks, lower chip area, and acceptable throughput.
Hanan Rady +3 more
semanticscholar +1 more source
Secure AES Hardware Module for Resource Constrained Devices
2005Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices’ resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an
Elena Trichina, Tymur Korkishko
openaire +1 more source
Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs
IEEE Transactions on Information Forensics and SecurityThe security and privacy challenges faced by Vehicular Ad hoc Networks (VANETs) have led to the development of conditional privacy-preserving authentication (CPPA) schemes.
Zihou Zhang +4 more
semanticscholar +1 more source
Design and LSI prototyping of security module with hardware trojan
2015 IEEE International Conference on Consumer Electronics (ICCE), 2015To examine the tamper resistance of consumer security products using cryptographic circuits, the present study develops countermeasure-annulled hardware Trojan and manufactures its prototyping as ASIC using 018 um CMOS. The present study also verifies the validity and effect of the hardware Trojan on the prototyping LSI by performing evaluation tests.
Masaya Yoshikawa +2 more
openaire +1 more source
Notice of Retraction Analysis of hardware security for cryptographical module
2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Haitao Sun, Jie Liu, Deqing Xue
openaire +1 more source
Efficient Hardware Implementation of the Lightweight CRYSTALS-Kyber
IEEE Transactions on Circuits and Systems Part 1: Regular PapersQuantum computing raises questions about the security of data encrypted using modern methods. Hence, the National Institute of Standards and Technology (NIST) has undertaken standardization of post-quantum cryptography (PQC) algorithms to defend against ...
Trong-Hung Nguyen +5 more
semanticscholar +1 more source
Understanding Hardware Security Modules (HSMs) for Blockchain and Cryptocurrency Security
Abstract Hardware Security Modules (HSMs) are purpose‑built devices that safeguard cryptographic keys and accelerate secure operations. In the context of blockchain and cryptocurrency, HSMs provide tamper‑resistant key storage, deterministic signing, and compliance with industry standards, thereby reducing the attack surface of wallets, exchanges, andopenaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly

