Configurable secure ECC hardware module for resource constrained device
2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia), 2009in this paper, a novel ECC hardware module that provides different secure levels for resource constrained device is introduced. We adopt MOF left-to-right recoding scheme to achieve small area. Moreover, the design reduces the area cost of modular inversion by exploring reusability.
Qian Xu, Yujie Zhou, null Junfa Mao
openaire +1 more source
Improving security in information technology using cryptographic hardware modules
Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology, 2003It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc.
R. Sanchez-Reillo +3 more
openaire +1 more source
Secure AES Hardware Module for Resource Constrained Devices
2005Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices’ resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an
Elena Trichina, Tymur Korkishko
openaire +1 more source
Design and LSI prototyping of security module with hardware trojan
2015 IEEE International Conference on Consumer Electronics (ICCE), 2015To examine the tamper resistance of consumer security products using cryptographic circuits, the present study develops countermeasure-annulled hardware Trojan and manufactures its prototyping as ASIC using 018 um CMOS. The present study also verifies the validity and effect of the hardware Trojan on the prototyping LSI by performing evaluation tests.
Masaya Yoshikawa +2 more
openaire +1 more source
Notice of Retraction Analysis of hardware security for cryptographical module
2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Haitao Sun, Jie Liu, Deqing Xue
openaire +1 more source
Understanding Hardware Security Modules (HSMs) for Blockchain and Cryptocurrency Security
Abstract Hardware Security Modules (HSMs) are purpose‑built devices that safeguard cryptographic keys and accelerate secure operations. In the context of blockchain and cryptocurrency, HSMs provide tamper‑resistant key storage, deterministic signing, and compliance with industry standards, thereby reducing the attack surface of wallets, exchanges, andopenaire +1 more source
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module
2012Todays in-vehicle IT architectures are dominated by a large network of interactive, software driven digital microprocessors called electronic control units (ECU). However, ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for ...
Marko Wolf, Timo Gendrullis
openaire +1 more source
Hardware and Information Security Primitives Based on 2D Materials and Devices
Advanced Materials, 2023Saptarshi Das
exaly
A secure channel establishment method on a hardware security module
2014 International Conference on Information and Communication Technology Convergence (ICTC), 2014Daewon Kim, Yongsung Jeon, Jeongnyeo Kim
openaire +1 more source
Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module
IEEE Transactions on Computers, 2020Mohamad Ali Mehrabi +2 more
exaly

