Sciweavers

2945 search results - page 23 / 589
» Designing and Implementing Malicious Hardware
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 6 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
DAC
2000
ACM
15 years 4 months ago
System design of active basestations based on dynamically reconfigurable hardware
– This paper describes the system design and implementation of Active Basestations, a novel application of the run-time reconfigurable hardware technology whose applications have...
Athanassios Boulis, Mani B. Srivastava
HVC
2007
Springer
103views Hardware» more  HVC 2007»
15 years 5 months ago
Verifying Parametrised Hardware Designs Via Counter Automata
The paper presents a new approach to formal verification of generic (i.e. parametrised) hardware designs specified in VHDL. The proposed approach is based on a translation of suc...
Ales Smrcka, Tomás Vojnar
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 5 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
IPPS
1998
IEEE
15 years 4 months ago
A Hardware/Software Co-Design System Using Configurable Computing Technology
Virtual Computer Corporation has combined the latest reconfigurable component technology with a number of advanced software tools in one easy to use `system approach' to digi...
John Schwel