Results 11 to 20 of about 8,466 (185)
A Formally Verified Configuration for Hardware Security Modules in the Cloud [PDF]
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every ...
Riccardo Focardi, Flaminia Luccio
openaire +5 more sources
Design of programmable hardware security modules for enhancing blockchain based security framework
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP ...
Devika Kalathil Nandalal+1 more
openaire +3 more sources
Electronic Voting Using Identity Domain Separation and Hardware Security Modules [PDF]
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed.
Thomas Rößler
openaire +3 more sources
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
Maria Sommerhalder
openaire +2 more sources
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Alsouri, Sami+3 more
openaire +4 more sources
High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security [PDF]
This research highlights the rapid development of technology in the industry, particularly Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT), cloud computing, big data, and data analysis. Despite providing efficiency, these developments also bring negative impacts, such as increased cyber-attacks, especially in ...
Amael, Joshua Tito+2 more
openaire +3 more sources
Hardware Security Module (HSM) [PDF]
Dirk Fox
openaire +3 more sources
INTEGRATION OF HARDWARE SECURITY MODULES INTO A DEEPLY EMBEDDED TLS STACK
The Transport Layer Security (TLS) protocol is a well-established standard for securing communication over insecure communication links, offering layer-4 VPN functionality. In the classical Internet TLS is widely used. With the advances of the Internet of Things (IoT) there is an increasing need to secure communication on resource-constrained embedded ...
Kehret, Oliver+2 more
openaire +5 more sources
A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses
It has been demonstrated that Software exploitable Hardware Trojan Horses (HTHs) can be inserted in commercial CPUs and memories. Such attacks allow malicious users to run their own software or to gain unauthorized privileges over the system. As a consequence, HTHs must nowadays be considered a serious threat not only from academy but also from ...
Palumbo A.+4 more
openaire +6 more sources
Low latency FPGA implementation of twisted Edward curve cryptography hardware accelerator over prime field [PDF]
The performance of any elliptic curve cryptography hardware accelerator significantly relies on the efficiency of the underlying point multiplication (PM) architecture.
Md Rownak Hossain+7 more
doaj +2 more sources