Results 41 to 50 of about 8,466 (185)
Design of a secure encryption circuit for SHE specification
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj +1 more source
Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices [PDF]
Toubkal is a new hardware architecture which provides secure, efficient and flexible hardware isolation. It is a modular system that offers strong separation of different hardware modules within a system. Lightweight devices use mainly a Memory Protection Unit (MPU) to protect the memory and create an isolation architecture.
David Hely+2 more
openaire +2 more sources
Insider Attack Model Against HSM-Based Architecture
Data security is an increasingly important issue in 2023. Whether about user privacy, data availability, or integrity, consumer information is getting targeted by cyber-pirates for various motives.
Marc Dib, Samuel Pierre
doaj +1 more source
An embedded DSP hardware encryption module for secure e‐commerce transactions [PDF]
AbstractCryptography is one of the key elements in providing security for modern e‐commerce systems. It is well known that software‐based encryption has built‐in security weaknesses due to storing and managing digital certificates/keys in a high‐risk environment such as a local hard disk or software.
Xuan Dau Hoang+2 more
openaire +1 more source
Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case [PDF]
Antonio Cabrera+5 more
openalex +1 more source
Survey of security for Android smart terminal
Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the ...
Yan-ping XU+4 more
doaj +2 more sources
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj +1 more source
The acoustic encryption transmission system based on improved DEA
The system adopts the improved data encryption algorithm(DEA), and the hardware encryption system is constructed by complex programmable logic device(CPLD) chip EPM570.
Shan Huilin, Zhang Yinsheng
doaj +1 more source
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Garbling schemes are useful building blocks for enabling secure multi-party computation (MPC), but require considerable computational resources both for the garbler and the evaluator. Thus, they cannot be easily used in a resource-restricted setting, e.g. on mobile devices.
Doerner, Dominik+2 more
openaire +3 more sources
Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to ...
Rosario Arjona+3 more
doaj +1 more source