Academic literature on the topic 'Hardware Security Primitives'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hardware Security Primitives.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hardware Security Primitives"
Labrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Full textHuffmire, Ted, Timothy Levin, Thuy Nguyen, et al. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.
Full textGordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Full textZhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Full textBi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, et al. "Emerging Technology-Based Design of Primitives for Hardware Security." ACM Journal on Emerging Technologies in Computing Systems 13, no. 1 (2016): 1–19. http://dx.doi.org/10.1145/2816818.
Full textDubrova, Elena. "Energy-efficient cryptographic primitives." Facta universitatis - series: Electronics and Energetics 31, no. 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.
Full textMüller, Nicolai, and Amir Moradi. "Automated Generation of Fault-Resistant Circuits." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 136–73. http://dx.doi.org/10.46586/tches.v2024.i3.136-173.
Full textVenkataraman, Anusha, Eberechukwu Amadi, and Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks." Micro 2, no. 3 (2022): 361–68. http://dx.doi.org/10.3390/micro2030024.
Full textTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Full textTsantikidou, Kyriaki, and Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare." Cryptography 6, no. 3 (2022): 45. http://dx.doi.org/10.3390/cryptography6030045.
Full textDissertations / Theses on the topic "Hardware Security Primitives"
Basak, Abhishek. "INFRASTRUCTURE AND PRIMITIVES FOR HARDWARE SECURITY IN INTEGRATED CIRCUITS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1458787036.
Full textMa, Yao. "Quantum Hardware Security and Near-term Applications." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS500.pdf.
Full textSabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Full textOuattara, Frédéric. "Primitives de sécurité à base de mémoires magnétiques." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS072.
Full textWild, Alexander [Verfasser], Tim [Gutachter] Güneysu, and Amir [Gutachter] Moradi. "Structure-aware design of security primitives on reconfigurable hardware / Alexander Wild ; Gutachter: Tim Güneysu, Amir Moradi ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1152077902/34.
Full textJuliato, Marcio. "Fault Tolerant Cryptographic Primitives for Space Applications." Thesis, 2011. http://hdl.handle.net/10012/5876.
Full textBooks on the topic "Hardware Security Primitives"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Full textPundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.
Find full textVashistha, Nidish. Hardware Security Primitives. Springer International Publishing AG, 2023.
Find full textBook chapters on the topic "Hardware Security Primitives"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Analog Security." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_14.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Intrinsic Racetrack PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_1.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Fault Injection Resistant Cryptographic Hardware." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_19.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Hybrid Extrinsic Radio Frequency PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_6.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Tamper Detection." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_15.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Side-Channel Protection in Cryptographic Hardware." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_18.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Direct Intrinsic Characterization PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_3.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Lightweight Cryptography." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_12.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Package-Level Counterfeit Detection and Avoidance." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_17.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Virtual Proof of Reality." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_13.
Full textConference papers on the topic "Hardware Security Primitives"
Du, Nan, Mahdi Kiani, Xianyue Zhao, et al. "Electroforming-free Memristors for Hardware Security Primitives." In 2019 IEEE 4th International Verification and Security Workshop (IVSW). IEEE, 2019. http://dx.doi.org/10.1109/ivsw.2019.8854394.
Full textRose, Garrett S., Mesbah Uddin, and Md Badruddoja Majumder. "A Designer's Rationale for Nanoelectronic Hardware Security Primitives." In 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2016. http://dx.doi.org/10.1109/isvlsi.2016.114.
Full textSingh, Simranjeet, Furqan Zahoor, Gokul Rajendran, Sachin Patkar, Anupam Chattopadhyay, and Farhad Merchant. "Hardware Security Primitives Using Passive RRAM Crossbar Array." In ASPDAC '23: 28th Asia and South Pacific Design Automation Conference. ACM, 2023. http://dx.doi.org/10.1145/3566097.3568348.
Full textPugazhenthi, Anugayathiri, Nima Karimian, and Fatemeh Tehranipoor. "DLA-PUF: deep learning attacks on hardware security primitives." In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, edited by Michael C. Dudzik and Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2519257.
Full textXu, Xiaolin, Vikram Suresh, Raghavan Kumar, and Wayne Burleson. "Post-Silicon Validation and Calibration of Hardware Security Primitives." In 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2014. http://dx.doi.org/10.1109/isvlsi.2014.80.
Full textAnandakumar, N. Nalla, Somitra Kumar Sanadhya, and Mohammad S. Hashmi. "Design, Implementation and Analysis of Efficient Hardware-Based Security Primitives." In 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC). IEEE, 2020. http://dx.doi.org/10.1109/vlsi-soc46417.2020.9344097.
Full textAramoon, Omid, Gang Qu, and Aijiao Cui. "Building Hardware Security Primitives Using Scan-based Design-for-Testability." In 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2022. http://dx.doi.org/10.1109/mwscas54063.2022.9859460.
Full textSharma, Giriraj, Amit M. Joshi, and Saraju P. Mohanty. "Fortified-Grid 3.0: Security by Design for Smart Grid through Hardware Security Primitives." In 2023 IEEE International Symposium on Smart Electronic Systems (iSES). IEEE, 2023. http://dx.doi.org/10.1109/ises58672.2023.00044.
Full textZhou, Qihang, Wenzhuo Cao, Xiaoqi Jia, et al. "RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives." In Network and Distributed System Security Symposium. Internet Society, 2025. https://doi.org/10.14722/ndss.2025.240328.
Full textThapliyal, Himanshu, and S. Dinesh Kumar. "Energy-recovery based hardware security primitives for low-power embedded devices." In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326326.
Full text