Academic literature on the topic 'Hardware Security Primitives'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hardware Security Primitives.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hardware Security Primitives"

1

Labrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huffmire, Ted, Timothy Levin, Thuy Nguyen, et al. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.

Full text
Abstract:
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (2018): 48. http://dx.doi.org/10.3390/jlpea8040048.

Full text
Abstract:
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
5

Bi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, et al. "Emerging Technology-Based Design of Primitives for Hardware Security." ACM Journal on Emerging Technologies in Computing Systems 13, no. 1 (2016): 1–19. http://dx.doi.org/10.1145/2816818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dubrova, Elena. "Energy-efficient cryptographic primitives." Facta universitatis - series: Electronics and Energetics 31, no. 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.

Full text
Abstract:
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem. First, we show how to design cryptographic primitives which can assure integrity and confidentiality of transmitted messages while satisfying resource constrains of low-end low-cost wireless devices such as sensors or RFID tags. Second, we describe countermeasures which can enhan
APA, Harvard, Vancouver, ISO, and other styles
7

Müller, Nicolai, and Amir Moradi. "Automated Generation of Fault-Resistant Circuits." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 136–73. http://dx.doi.org/10.46586/tches.v2024.i3.136-173.

Full text
Abstract:
Fault Injection (FI) attacks, which involve intentionally introducing faults into a system to cause it to behave in an unintended manner, are widely recognized and pose a significant threat to the security of cryptographic primitives implemented in hardware, making fault tolerance an increasingly critical concern. However, protecting cryptographic hardware primitives securely and efficiently, even with wellestablished and documented methods such as redundant computation, can be a timeconsuming, error-prone, and expertise-demanding task. In this research, we present a comprehensive and fully-au
APA, Harvard, Vancouver, ISO, and other styles
8

Venkataraman, Anusha, Eberechukwu Amadi, and Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks." Micro 2, no. 3 (2022): 361–68. http://dx.doi.org/10.3390/micro2030024.

Full text
Abstract:
Nanomaterials are promising alternatives for creating hardware security primitives that are considered more robust and less susceptible to physical attacks compared to standard CMOS-based approaches. Here, nanoscale electronic circuits composed of tunable ratios of molecules and colloidal nanoparticles formed via self-assembly on silicon wafers are investigated for information and hardware security by utilizing device-level physical variations induced during fabrication. Two-terminal electronic transport measurements show variations in current through different parts of the nanoscale network,
APA, Harvard, Vancouver, ISO, and other styles
9

Tomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.

Full text
Abstract:
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute effi­ciently in hardware. 128-bit security, with no known security weaknesses is claimed by Rabbit's designers. Since hardware performance of Rabbit was only estimated in the proposal of algorithm, comparison of direct and optimized FPGA im­plementations of Rabbit stream cipher is presented, ide
APA, Harvard, Vancouver, ISO, and other styles
10

Tsantikidou, Kyriaki, and Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare." Cryptography 6, no. 3 (2022): 45. http://dx.doi.org/10.3390/cryptography6030045.

Full text
Abstract:
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity and authenticity of IoT-based designs are crucial in the health domain because the collected data are sensitive, and the continuous availability of the system is critical for the user’s wellbeing. However, the IoT consists of resource-constrained devices that increase the difficulty of implementing high-level-security schemes. Therefore, in the current paper, renowned lightweight cryptographic primitives and
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hardware Security Primitives"

1

Basak, Abhishek. "INFRASTRUCTURE AND PRIMITIVES FOR HARDWARE SECURITY IN INTEGRATED CIRCUITS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1458787036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Yao. "Quantum Hardware Security and Near-term Applications." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS500.pdf.

Full text
Abstract:
Les primitives de sécurité matérielle sont des composants et des mécanismes fondamentaux basés sur le matériel et utilisés pour améliorer la sécurité des systèmes informatiques modernes en général. Ces primitives fournissent des éléments de base pour la mise en œuvre des fonctions de sécurité et la protection contre les menaces afin de garantir l'intégrité, la confidentialité et la disponibilité des informations et des ressources. Avec le développement à grande vitesse de l'informatique quantique et du traitement de l'information, la construction de primitives de sécurité matérielle avec des s
APA, Harvard, Vancouver, ISO, and other styles
3

Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.

Full text
Abstract:
Le paysage du monde des téléphones mobiles a changé avec l’introduction des ordiphones (de l’anglais smartphones). En effet, depuis leur avènement, les ordiphones sont devenus incontournables dans des différents aspects de la vie quotidienne. Cela a poussé de nombreux fournisseurs de services de rendre leurs services disponibles sur mobiles. Malgré cette croissante popularité, l’adoption des ordiphones pour des applications sensibles n’a toujours pas eu un grand succès. La raison derrière cela est que beaucoup d’utilisateurs, de plus en plus concernés par la sécurité de leurs appareils, ne fon
APA, Harvard, Vancouver, ISO, and other styles
4

Ouattara, Frédéric. "Primitives de sécurité à base de mémoires magnétiques." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS072.

Full text
Abstract:
Les mémoires magnétiques (MRAM) font partie des technologies de mémoires non volatiles émergentes ayant connu un développement rapide cette dernière décennie. Un des avantages de cette technologie réside dans les domaines d’applications variées dans lesquelles elle peut intervenir. En plus de sa fonction principale de stockage d’information, la MRAM est utilisée de nos jours dans des applications de type capteurs, récepteur RF et sécurité matérielle. Dans cette thèse, nous nous sommes intéressés à l’utilisation des MRAM dans la conception des primitives de sécurité matérielle élémentaires. Dan
APA, Harvard, Vancouver, ISO, and other styles
5

Wild, Alexander [Verfasser], Tim [Gutachter] Güneysu, and Amir [Gutachter] Moradi. "Structure-aware design of security primitives on reconfigurable hardware / Alexander Wild ; Gutachter: Tim Güneysu, Amir Moradi ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1152077902/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Juliato, Marcio. "Fault Tolerant Cryptographic Primitives for Space Applications." Thesis, 2011. http://hdl.handle.net/10012/5876.

Full text
Abstract:
Spacecrafts are extensively used by public and private sectors to support a variety of services. Considering the cost and the strategic importance of these spacecrafts, there has been an increasing demand to utilize strong cryptographic primitives to assure their security. Moreover, it is of utmost importance to consider fault tolerance in their designs due to the harsh environment found in space, while keeping low area and power consumption. The problem of recovering spacecrafts from failures or attacks, and bringing them back to an operational and safe state is crucial for reliability. Despi
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Hardware Security Primitives"

1

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vashistha, Nidish. Hardware Security Primitives. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hardware Security Primitives"

1

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Analog Security." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Intrinsic Racetrack PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Fault Injection Resistant Cryptographic Hardware." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Hybrid Extrinsic Radio Frequency PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Tamper Detection." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Side-Channel Protection in Cryptographic Hardware." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Direct Intrinsic Characterization PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Lightweight Cryptography." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Package-Level Counterfeit Detection and Avoidance." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Virtual Proof of Reality." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hardware Security Primitives"

1

Du, Nan, Mahdi Kiani, Xianyue Zhao, et al. "Electroforming-free Memristors for Hardware Security Primitives." In 2019 IEEE 4th International Verification and Security Workshop (IVSW). IEEE, 2019. http://dx.doi.org/10.1109/ivsw.2019.8854394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rose, Garrett S., Mesbah Uddin, and Md Badruddoja Majumder. "A Designer's Rationale for Nanoelectronic Hardware Security Primitives." In 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2016. http://dx.doi.org/10.1109/isvlsi.2016.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Simranjeet, Furqan Zahoor, Gokul Rajendran, Sachin Patkar, Anupam Chattopadhyay, and Farhad Merchant. "Hardware Security Primitives Using Passive RRAM Crossbar Array." In ASPDAC '23: 28th Asia and South Pacific Design Automation Conference. ACM, 2023. http://dx.doi.org/10.1145/3566097.3568348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pugazhenthi, Anugayathiri, Nima Karimian, and Fatemeh Tehranipoor. "DLA-PUF: deep learning attacks on hardware security primitives." In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, edited by Michael C. Dudzik and Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2519257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Xiaolin, Vikram Suresh, Raghavan Kumar, and Wayne Burleson. "Post-Silicon Validation and Calibration of Hardware Security Primitives." In 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2014. http://dx.doi.org/10.1109/isvlsi.2014.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anandakumar, N. Nalla, Somitra Kumar Sanadhya, and Mohammad S. Hashmi. "Design, Implementation and Analysis of Efficient Hardware-Based Security Primitives." In 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC). IEEE, 2020. http://dx.doi.org/10.1109/vlsi-soc46417.2020.9344097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aramoon, Omid, Gang Qu, and Aijiao Cui. "Building Hardware Security Primitives Using Scan-based Design-for-Testability." In 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2022. http://dx.doi.org/10.1109/mwscas54063.2022.9859460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Giriraj, Amit M. Joshi, and Saraju P. Mohanty. "Fortified-Grid 3.0: Security by Design for Smart Grid through Hardware Security Primitives." In 2023 IEEE International Symposium on Smart Electronic Systems (iSES). IEEE, 2023. http://dx.doi.org/10.1109/ises58672.2023.00044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Qihang, Wenzhuo Cao, Xiaoqi Jia, et al. "RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives." In Network and Distributed System Security Symposium. Internet Society, 2025. https://doi.org/10.14722/ndss.2025.240328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thapliyal, Himanshu, and S. Dinesh Kumar. "Energy-recovery based hardware security primitives for low-power embedded devices." In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!