Results 271 to 280 of about 139,929 (306)
Some of the next articles are maybe not open access.

Configurable secure ECC hardware module for resource constrained device

2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia), 2009
in this paper, a novel ECC hardware module that provides different secure levels for resource constrained device is introduced. We adopt MOF left-to-right recoding scheme to achieve small area. Moreover, the design reduces the area cost of modular inversion by exploring reusability.
Qian Xu, Yujie Zhou, null Junfa Mao
openaire   +1 more source

Improving security in information technology using cryptographic hardware modules

Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology, 2003
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc.
R. Sanchez-Reillo   +3 more
openaire   +1 more source

Secure AES Hardware Module for Resource Constrained Devices

2005
Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices’ resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an
Elena Trichina, Tymur Korkishko
openaire   +1 more source

Design and LSI prototyping of security module with hardware trojan

2015 IEEE International Conference on Consumer Electronics (ICCE), 2015
To examine the tamper resistance of consumer security products using cryptographic circuits, the present study develops countermeasure-annulled hardware Trojan and manufactures its prototyping as ASIC using 018 um CMOS. The present study also verifies the validity and effect of the hardware Trojan on the prototyping LSI by performing evaluation tests.
Masaya Yoshikawa   +2 more
openaire   +1 more source

Notice of Retraction Analysis of hardware security for cryptographical module

2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013
FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Haitao Sun, Jie Liu, Deqing Xue
openaire   +1 more source

Understanding Hardware Security Modules (HSMs) for Blockchain and Cryptocurrency Security

Abstract Hardware Security Modules (HSMs) are purpose‑built devices that safeguard cryptographic keys and accelerate secure operations. In the context of blockchain and cryptocurrency, HSMs provide tamper‑resistant key storage, deterministic signing, and compliance with industry standards, thereby reducing the attack surface of wallets, exchanges, and
openaire   +1 more source

Design, Implementation, and Evaluation of a Vehicular Hardware Security Module

2012
Todays in-vehicle IT architectures are dominated by a large network of interactive, software driven digital microprocessors called electronic control units (ECU). However, ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for ...
Marko Wolf, Timo Gendrullis
openaire   +1 more source

A secure channel establishment method on a hardware security module

2014 International Conference on Information and Communication Technology Convergence (ICTC), 2014
Daewon Kim, Yongsung Jeon, Jeongnyeo Kim
openaire   +1 more source

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module

IEEE Transactions on Computers, 2020
Mohamad Ali Mehrabi   +2 more
exaly  

Home - About - Disclaimer - Privacy