Добірка наукової літератури з теми "Hardware Security Primitives"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Hardware Security Primitives".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Hardware Security Primitives"

1

Labrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Huffmire, Ted, Timothy Levin, Thuy Nguyen, et al. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.

Повний текст джерела
Анотація:
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (2018): 48. http://dx.doi.org/10.3390/jlpea8040048.

Повний текст джерела
Анотація:
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, et al. "Emerging Technology-Based Design of Primitives for Hardware Security." ACM Journal on Emerging Technologies in Computing Systems 13, no. 1 (2016): 1–19. http://dx.doi.org/10.1145/2816818.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dubrova, Elena. "Energy-efficient cryptographic primitives." Facta universitatis - series: Electronics and Energetics 31, no. 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.

Повний текст джерела
Анотація:
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem. First, we show how to design cryptographic primitives which can assure integrity and confidentiality of transmitted messages while satisfying resource constrains of low-end low-cost wireless devices such as sensors or RFID tags. Second, we describe countermeasures which can enhan
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Müller, Nicolai, and Amir Moradi. "Automated Generation of Fault-Resistant Circuits." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 136–73. http://dx.doi.org/10.46586/tches.v2024.i3.136-173.

Повний текст джерела
Анотація:
Fault Injection (FI) attacks, which involve intentionally introducing faults into a system to cause it to behave in an unintended manner, are widely recognized and pose a significant threat to the security of cryptographic primitives implemented in hardware, making fault tolerance an increasingly critical concern. However, protecting cryptographic hardware primitives securely and efficiently, even with wellestablished and documented methods such as redundant computation, can be a timeconsuming, error-prone, and expertise-demanding task. In this research, we present a comprehensive and fully-au
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Venkataraman, Anusha, Eberechukwu Amadi, and Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks." Micro 2, no. 3 (2022): 361–68. http://dx.doi.org/10.3390/micro2030024.

Повний текст джерела
Анотація:
Nanomaterials are promising alternatives for creating hardware security primitives that are considered more robust and less susceptible to physical attacks compared to standard CMOS-based approaches. Here, nanoscale electronic circuits composed of tunable ratios of molecules and colloidal nanoparticles formed via self-assembly on silicon wafers are investigated for information and hardware security by utilizing device-level physical variations induced during fabrication. Two-terminal electronic transport measurements show variations in current through different parts of the nanoscale network,
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.

Повний текст джерела
Анотація:
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute effi­ciently in hardware. 128-bit security, with no known security weaknesses is claimed by Rabbit's designers. Since hardware performance of Rabbit was only estimated in the proposal of algorithm, comparison of direct and optimized FPGA im­plementations of Rabbit stream cipher is presented, ide
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tsantikidou, Kyriaki, and Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare." Cryptography 6, no. 3 (2022): 45. http://dx.doi.org/10.3390/cryptography6030045.

Повний текст джерела
Анотація:
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity and authenticity of IoT-based designs are crucial in the health domain because the collected data are sensitive, and the continuous availability of the system is critical for the user’s wellbeing. However, the IoT consists of resource-constrained devices that increase the difficulty of implementing high-level-security schemes. Therefore, in the current paper, renowned lightweight cryptographic primitives and
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Hardware Security Primitives"

1

Basak, Abhishek. "INFRASTRUCTURE AND PRIMITIVES FOR HARDWARE SECURITY IN INTEGRATED CIRCUITS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1458787036.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ma, Yao. "Quantum Hardware Security and Near-term Applications." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS500.pdf.

Повний текст джерела
Анотація:
Les primitives de sécurité matérielle sont des composants et des mécanismes fondamentaux basés sur le matériel et utilisés pour améliorer la sécurité des systèmes informatiques modernes en général. Ces primitives fournissent des éléments de base pour la mise en œuvre des fonctions de sécurité et la protection contre les menaces afin de garantir l'intégrité, la confidentialité et la disponibilité des informations et des ressources. Avec le développement à grande vitesse de l'informatique quantique et du traitement de l'information, la construction de primitives de sécurité matérielle avec des s
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.

Повний текст джерела
Анотація:
Le paysage du monde des téléphones mobiles a changé avec l’introduction des ordiphones (de l’anglais smartphones). En effet, depuis leur avènement, les ordiphones sont devenus incontournables dans des différents aspects de la vie quotidienne. Cela a poussé de nombreux fournisseurs de services de rendre leurs services disponibles sur mobiles. Malgré cette croissante popularité, l’adoption des ordiphones pour des applications sensibles n’a toujours pas eu un grand succès. La raison derrière cela est que beaucoup d’utilisateurs, de plus en plus concernés par la sécurité de leurs appareils, ne fon
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ouattara, Frédéric. "Primitives de sécurité à base de mémoires magnétiques." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS072.

Повний текст джерела
Анотація:
Les mémoires magnétiques (MRAM) font partie des technologies de mémoires non volatiles émergentes ayant connu un développement rapide cette dernière décennie. Un des avantages de cette technologie réside dans les domaines d’applications variées dans lesquelles elle peut intervenir. En plus de sa fonction principale de stockage d’information, la MRAM est utilisée de nos jours dans des applications de type capteurs, récepteur RF et sécurité matérielle. Dans cette thèse, nous nous sommes intéressés à l’utilisation des MRAM dans la conception des primitives de sécurité matérielle élémentaires. Dan
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wild, Alexander [Verfasser], Tim [Gutachter] Güneysu, and Amir [Gutachter] Moradi. "Structure-aware design of security primitives on reconfigurable hardware / Alexander Wild ; Gutachter: Tim Güneysu, Amir Moradi ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1152077902/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Juliato, Marcio. "Fault Tolerant Cryptographic Primitives for Space Applications." Thesis, 2011. http://hdl.handle.net/10012/5876.

Повний текст джерела
Анотація:
Spacecrafts are extensively used by public and private sectors to support a variety of services. Considering the cost and the strategic importance of these spacecrafts, there has been an increasing demand to utilize strong cryptographic primitives to assure their security. Moreover, it is of utmost importance to consider fault tolerance in their designs due to the harsh environment found in space, while keeping low area and power consumption. The problem of recovering spacecrafts from failures or attacks, and bringing them back to an operational and safe state is crucial for reliability. Despi
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Hardware Security Primitives"

1

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Pundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vashistha, Nidish. Hardware Security Primitives. Springer International Publishing AG, 2023.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Hardware Security Primitives"

1

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Analog Security." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Intrinsic Racetrack PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Fault Injection Resistant Cryptographic Hardware." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Hybrid Extrinsic Radio Frequency PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Tamper Detection." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Side-Channel Protection in Cryptographic Hardware." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Direct Intrinsic Characterization PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Lightweight Cryptography." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Package-Level Counterfeit Detection and Avoidance." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Virtual Proof of Reality." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Hardware Security Primitives"

1

Du, Nan, Mahdi Kiani, Xianyue Zhao, et al. "Electroforming-free Memristors for Hardware Security Primitives." In 2019 IEEE 4th International Verification and Security Workshop (IVSW). IEEE, 2019. http://dx.doi.org/10.1109/ivsw.2019.8854394.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Rose, Garrett S., Mesbah Uddin, and Md Badruddoja Majumder. "A Designer's Rationale for Nanoelectronic Hardware Security Primitives." In 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2016. http://dx.doi.org/10.1109/isvlsi.2016.114.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Singh, Simranjeet, Furqan Zahoor, Gokul Rajendran, Sachin Patkar, Anupam Chattopadhyay, and Farhad Merchant. "Hardware Security Primitives Using Passive RRAM Crossbar Array." In ASPDAC '23: 28th Asia and South Pacific Design Automation Conference. ACM, 2023. http://dx.doi.org/10.1145/3566097.3568348.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pugazhenthi, Anugayathiri, Nima Karimian, and Fatemeh Tehranipoor. "DLA-PUF: deep learning attacks on hardware security primitives." In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, edited by Michael C. Dudzik and Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2519257.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Xu, Xiaolin, Vikram Suresh, Raghavan Kumar, and Wayne Burleson. "Post-Silicon Validation and Calibration of Hardware Security Primitives." In 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2014. http://dx.doi.org/10.1109/isvlsi.2014.80.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Anandakumar, N. Nalla, Somitra Kumar Sanadhya, and Mohammad S. Hashmi. "Design, Implementation and Analysis of Efficient Hardware-Based Security Primitives." In 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC). IEEE, 2020. http://dx.doi.org/10.1109/vlsi-soc46417.2020.9344097.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Aramoon, Omid, Gang Qu, and Aijiao Cui. "Building Hardware Security Primitives Using Scan-based Design-for-Testability." In 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2022. http://dx.doi.org/10.1109/mwscas54063.2022.9859460.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sharma, Giriraj, Amit M. Joshi, and Saraju P. Mohanty. "Fortified-Grid 3.0: Security by Design for Smart Grid through Hardware Security Primitives." In 2023 IEEE International Symposium on Smart Electronic Systems (iSES). IEEE, 2023. http://dx.doi.org/10.1109/ises58672.2023.00044.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhou, Qihang, Wenzhuo Cao, Xiaoqi Jia, et al. "RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives." In Network and Distributed System Security Symposium. Internet Society, 2025. https://doi.org/10.14722/ndss.2025.240328.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Thapliyal, Himanshu, and S. Dinesh Kumar. "Energy-recovery based hardware security primitives for low-power embedded devices." In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326326.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!