Sciweavers

1019 search results - page 71 / 204
» Cryptographic Design Vulnerabilities
Sort
View
DAC
2005
ACM
15 years 6 months ago
Logic soft errors in sub-65nm technologies design and CAD challenges
Logic soft errors are radiation induced transient errors in sequential elements (flip-flops and latches) and combinational logic. Robust enterprise platforms in sub-65nm technolog...
Subhasish Mitra, Tanay Karnik, Norbert Seifert, Mi...
129
Voted
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 9 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 9 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
129
Voted
HOST
2009
IEEE
15 years 1 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris
BSN
2009
IEEE
118views Sensor Networks» more  BSN 2009»
15 years 10 months ago
Smart Jacket Design for Neonatal Monitoring with Wearable Sensors
— Critically ill new born babies admitted at the Neonatal Intensive Care Unit (NICU) are extremely tiny and vulnerable to external disturbance. Smart Jacket proposed in this pape...
Sibrecht Bouwstra, Wei Chen, Loe M. G. Feijs, Sida...