Sciweavers

1019 search results - page 171 / 204
» Cryptographic Design Vulnerabilities
Sort
View
130
Voted
IACR
2011
137views more  IACR 2011»
14 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
144
Voted
BIRTHDAY
2012
Springer
13 years 11 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
159
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
158
Voted
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
110
Voted
DAC
2009
ACM
16 years 4 months ago
Statistical reliability analysis under process variation and aging effects
Circuit reliability is affected by various fabrication-time and run-time effects. Fabrication-induced process variation has significant impact on circuit performance and reliabilit...
Yinghai Lu, Li Shang, Hai Zhou, Hengliang Zhu, Fan...