Academic literature on the topic 'Hardware based encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hardware based encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hardware based encryption"
Huang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.
Full textKanda, Guard, and Kwangki Ryoo. "Vedic Multiplier-based International Data Encryption Algorithm Crypto-Core for Efficient Hardware Multiphase Encryption Design." Webology 19, no. 1 (2022): 4581–96. http://dx.doi.org/10.14704/web/v19i1/web19304.
Full textLee, Jaehyeok, Phap Ngoc Duong, and Hanho Lee. "Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption." Sensors 23, no. 17 (2023): 7389. http://dx.doi.org/10.3390/s23177389.
Full textPAPAEFSTATHIOU, IOANNIS. "LOW LEVEL HARDWARE COMPRESSION FOR MULTI-GIGABIT NETWORKS." Journal of Circuits, Systems and Computers 13, no. 06 (2004): 1307–19. http://dx.doi.org/10.1142/s0218126604001969.
Full textB, Lakshmi, Kirubakaran E, and Prabakar T.N. "FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION." ICTACT Journal on Communication Technology 01, no. 03 (2010): 150–56. http://dx.doi.org/10.21917/ijct.2010.0022.
Full textXiao Bao-Jin, Tong Hai-Li, Zhang Jian-Zhong, Zhang Chao-Xia, and Wang Yun-Cai. "Spread spectrum communication based on hardware encryption." Acta Physica Sinica 60, no. 8 (2011): 080506. http://dx.doi.org/10.7498/aps.60.080506.
Full textHuang, Birong, Zhansheng Hou, Peng Lin, and Fei Zhou. "Implementation Method Of Remote Assistance Instruction Based On Hardware Secure Encryption." Journal of Physics: Conference Series 2136, no. 1 (2021): 012031. http://dx.doi.org/10.1088/1742-6596/2136/1/012031.
Full textLi, Jiakun, Yixuan Luo, Fei Wang, and Wei Gao. "Design and Implementation of Real-Time Image Acquisition Chip Based on Triple-Hybrid Encryption System." Electronics 11, no. 18 (2022): 2925. http://dx.doi.org/10.3390/electronics11182925.
Full textMahmood, Zainab H., and Mahmood K. Ibrahem. "HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV." Iraqi Journal of Information & Communications Technology 2, no. 2 (2019): 44–57. http://dx.doi.org/10.31987/ijict.2.2.69.
Full text张, 晓强. "Image Encryption Algorithm Based on the Hardware Platform." Journal of Image and Signal Processing 08, no. 02 (2019): 98–102. http://dx.doi.org/10.12677/jisp.2019.82014.
Full textDissertations / Theses on the topic "Hardware based encryption"
Sampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.
Full textAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Full textGough, Michael Andreas. "Applying Attribute-Based Encryption in Two-Way Radio Talk Groups: A Feasibility Study." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6836.
Full textIbrahim, Mohamad A. "Hardware Realization of Chaos-based Symmetric Video Encryption." Thesis, 2013. http://hdl.handle.net/10754/293352.
Full textBarakat, Mohamed L. "Hardware Realization of Chaos Based Symmetric Image Encryption." Thesis, 2012. http://hdl.handle.net/10754/234953.
Full textCHANG, CHENG-HSIN, and 張鉦新. "Data Encryption based on Hardware and Software Parameters." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/4huf4w.
Full textLin, Ya-Jheng, and 林亞正. "Hardware Implementations of Image Encryption Based on Chaotic Permutation-Diffusion Scheme." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/42275689096675550219.
Full textFAN, HAO-SHIANG, and 范皓翔. "Hardware Design of Color Image Encryption Based on Chaotic Permutation-diffusion Scheme." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/856h4e.
Full textBorges, Guilherme Rosas. "Practical Isolated Searchable Encryption in a Trusted Computing Environment." Master's thesis, 2018. http://hdl.handle.net/10362/59506.
Full textBooks on the topic "Hardware based encryption"
Khairallah, Mustafa. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6344-4.
Full textJoye, Marc, and Jean-Jacques Quisquater. Cryptographic Hardware and Embedded Systems - CHES 2004 00: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Springer-Verlag Berlin Heidelberg, 2004.
Find full textKaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Springer-Verlag Berlin Heidelberg, 2003.
Find full textKhairallah, Mustafa. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer, 2022.
Find full textKhairallah, Mustafa. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore Pte. Limited, 2021.
Find full textRobshaw, Matthew, and Lejla Batina. Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings. Springer London, Limited, 2014.
Find full textCryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings. Springer, 2014.
Find full textBook chapters on the topic "Hardware based encryption"
Sinha Roy, Sujoy, and Ingrid Verbauwhede. "Ring-LWE Public Key Encryption Processor." In Lattice-Based Public-Key Cryptography in Hardware. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9994-8_5.
Full textKhairallah, Mustafa. "On the Cost of ASIC Hardware Crackers." In Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_2.
Full textKhairallah, Mustafa. "Hardware Performance of the $$\Theta $$CB3 Algorithm." In Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_3.
Full textDoröz, Yarkın, Erdinç Öztürk, Erkay Savaş, and Berk Sunar. "Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48324-4_10.
Full textKhairallah, Mustafa. "Analysis of Lightweight BC-Based AEAD." In Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_5.
Full textKhairallah, Mustafa. "Arguments for Tweakable Block Cipher-Based Cryptography." In Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_4.
Full textWürstlein, Alexander, Michael Gernoth, Johannes Götzfried, and Tilo Müller. "Exzess: Hardware-Based RAM Encryption Against Physical Memory Disclosure." In Architecture of Computing Systems – ARCS 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30695-7_5.
Full textBhatotia, Pramod, Markulf Kohlweiss, Lorenzo Martinico, and Yiannis Tselekounis. "Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption." In Public-Key Cryptography – PKC 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75248-4_25.
Full textKhairallah, Mustafa. "Remus: Lighweight AEAD from Ideal Ciphers." In Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_7.
Full textKhairallah, Mustafa. "Romulus: Lighweight AEAD from Tweakable Block Ciphers." In Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_6.
Full textConference papers on the topic "Hardware based encryption"
Li, Xiaoguo, Guomin Yang, Tao Xiang, et al. "Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00100.
Full textSingh, Gurdeep, and Sonam Mittal. "A Study on Hardware-based Implementation of Homomorphic Encryption." In 2025 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE). IEEE, 2025. https://doi.org/10.1109/iitcee64140.2025.10915411.
Full textLiu, Xuankai, and Bing Li. "Design of a Hybrid Encryption Scheme Based on Software and Hardware Collaboratin." In 2024 9th International Conference on Signal and Image Processing (ICSIP). IEEE, 2024. http://dx.doi.org/10.1109/icsip61881.2024.10671467.
Full textAdamo, Oluwayomi, and Murali R. Varanasi. "Hardware based encryption for wireless networks." In MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5679550.
Full textNikhil, N. A., and D. S. Harish Ram. "Hardware implementation of quasigroup based encryption." In 2014 International Conference on Embedded Systems (ICES). IEEE, 2014. http://dx.doi.org/10.1109/embeddedsys.2014.6953050.
Full textCaroline Akinwonmi, Folasade, Boniface Kayode Alese, Folasade M. Dahunsi, Festus A. Osuolale, and Ayodele E Odo. "Design of Circuit System-Based Cryptography." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2155.
Full textGiesl, Jiri, Ladislav behal, and Karel Vlcek. "Hardware solution of chaos based image encryption." In 2009 12th International Symposium on Design and Diagnostics of Electronic Circuits & Systems. IEEE, 2009. http://dx.doi.org/10.1109/ddecs.2009.5012127.
Full textHarper, S., and P. Athanas. "A security policy based upon hardware encryption." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265453.
Full textQawaqneh, Zakariya, Khaled Elleithy, Bandar Alotaibi, and Munif Alotaibi. "A new hardware quantum-based encryption algorithm." In 2014 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2014. http://dx.doi.org/10.1109/lisat.2014.6845201.
Full textHowe, J., C. Moore, M. O'Neill, F. Regazzoni, T. Güneysu, and K. Beeden. "Lattice-based Encryption Over Standard Lattices In Hardware." In DAC '16: The 53rd Annual Design Automation Conference 2016. ACM, 2016. http://dx.doi.org/10.1145/2897937.2898037.
Full text