Sciweavers

1957 search results - page 302 / 392
» Embedded Processor Security
Sort
View
125
Voted
FPL
2006
Springer
219views Hardware» more  FPL 2006»
15 years 8 months ago
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks
This paper presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously in...
François-Xavier Standaert, Gaël Rouvro...
138
Voted
AUSAI
2003
Springer
15 years 8 months ago
Decidability of Propositionally Quantified Logics of Knowledge
Abstract. Logics of knowledge have important applications for reasoning about security protocols and multi-agent systems. We extend the semantics for the logic of necessity with lo...
Tim French
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
15 years 8 months ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
CONEXT
2007
ACM
15 years 6 months ago
A next generation internet architecture for mobility and multi-homing support
The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
15 years 6 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...