Results 81 to 90 of about 263,653 (212)

The K2 Architecture for Trustworthy Hardware Security Modules

open access: yesProceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, 2023
Anish Athalye   +3 more
openaire   +2 more sources

Dual system trusted terminal computing architecture based on TPCM RoT

open access: yesTongxin xuebao
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui   +3 more
doaj  

Research on area-efficient low-entropy masking scheme for AES

open access: yesTongxin xuebao, 2019
Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling ...
Jiuxing JIANG   +4 more
doaj  

Hardware Security Module Specifications

open access: yes
Report on HSM specifications and final design.
openaire   +1 more source

Home - About - Disclaimer - Privacy