Статті в журналах з теми "Hardware Security Primitives"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Hardware Security Primitives".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Labrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Повний текст джерелаHuffmire, Ted, Timothy Levin, Thuy Nguyen, et al. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.
Повний текст джерелаGordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Повний текст джерелаZhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Повний текст джерелаBi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, et al. "Emerging Technology-Based Design of Primitives for Hardware Security." ACM Journal on Emerging Technologies in Computing Systems 13, no. 1 (2016): 1–19. http://dx.doi.org/10.1145/2816818.
Повний текст джерелаDubrova, Elena. "Energy-efficient cryptographic primitives." Facta universitatis - series: Electronics and Energetics 31, no. 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.
Повний текст джерелаMüller, Nicolai, and Amir Moradi. "Automated Generation of Fault-Resistant Circuits." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 136–73. http://dx.doi.org/10.46586/tches.v2024.i3.136-173.
Повний текст джерелаVenkataraman, Anusha, Eberechukwu Amadi, and Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks." Micro 2, no. 3 (2022): 361–68. http://dx.doi.org/10.3390/micro2030024.
Повний текст джерелаTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Повний текст джерелаTsantikidou, Kyriaki, and Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare." Cryptography 6, no. 3 (2022): 45. http://dx.doi.org/10.3390/cryptography6030045.
Повний текст джерелаLiu, Guoxiao, Keting Jia, Puwen Wei, and Lei Ju. "High-Performance Hardware Implementation of MPCitH and Picnic3." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 190–214. http://dx.doi.org/10.46586/tches.v2024.i2.190-214.
Повний текст джерелаPreetisudha Meher, Lukram Dhanachandra Singh,. "Advancing Hardware Security: A Review and Novel Design of Configurable Arbiter PUF with DCM-Induced Metastability for Enhanced Resource Efficiency and Unpredictability." Tuijin Jishu/Journal of Propulsion Technology 45, no. 01 (2024): 3804–16. http://dx.doi.org/10.52783/tjjpt.v45.i01.4934.
Повний текст джерелаChakraborty, Suvradip, Janaka Alawatugoda, and Chandrasekaran Pandu Rangan. "New approach to practical leakage-resilient public-key cryptography." Journal of Mathematical Cryptology 14, no. 1 (2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.
Повний текст джерелаMeschkov, Sergej, Daniel Lammers, Mehdi B. Tahoori, and Amir Moradi. "Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 542–82. https://doi.org/10.46586/tches.v2025.i3.542-582.
Повний текст джерелаPAVANELLO, Fabio. "Lighting the way to better security - The NEUROPULS photonics-based approach." HiPEAC info, no. 72 (June 27, 2024): 20–21. https://doi.org/10.5281/zenodo.12565070.
Повний текст джерелаAmsaad, Fathi, Mohammed Niamat, Amer Dawoud, and Selcuk Kose. "Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks." Information 9, no. 9 (2018): 224. http://dx.doi.org/10.3390/info9090224.
Повний текст джерелаChung, Kai-Min, Marios Georgiou, Ching-Yi Lai, and Vassilis Zikas. "Cryptography with Disposable Backdoors." Cryptography 3, no. 3 (2019): 22. http://dx.doi.org/10.3390/cryptography3030022.
Повний текст джерелаEl Hadj Youssef, Wajih, Ali Abdelli, Fethi Dridi, and Mohsen Machhout. "Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications." Security and Communication Networks 2020 (November 29, 2020): 1–13. http://dx.doi.org/10.1155/2020/8860598.
Повний текст джерелаMisono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.
Повний текст джерелаLara-Nino, Carlos Andres, Arturo Diaz-Perez, and Miguel Morales-Sandoval. "Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN." Security and Communication Networks 2018 (September 4, 2018): 1–14. http://dx.doi.org/10.1155/2018/5087065.
Повний текст джерелаRussinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy." Queue 21, no. 4 (2023): 44–48. http://dx.doi.org/10.1145/3623461.
Повний текст джерелаBathalapalli, Venkata K. V. V., Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer, and Bibhudutta Rout. "PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems." Sensors 24, no. 3 (2024): 938. http://dx.doi.org/10.3390/s24030938.
Повний текст джерелаAvani, Dave, and Dave Krunal. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.13337765.
Повний текст джерелаKrunal, Dave, and Dave Avani. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.12772515.
Повний текст джерелаMarin, Leandro, Antonio Jara, and Antonio Skarmeta. "Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2368–84. https://doi.org/10.3217/jucs-019-16-2368.
Повний текст джерелаAl-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane, and Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT." Sensors 20, no. 7 (2020): 1963. http://dx.doi.org/10.3390/s20071963.
Повний текст джерелаNili, Hussein, Gina C. Adam, Brian Hoskins, et al. "Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors." Nature Electronics 1, no. 3 (2018): 197–202. http://dx.doi.org/10.1038/s41928-018-0039-7.
Повний текст джерелаLi, Gaoxiang, and Yu Zhuang. "Rethinking PUF Design for Scalable Edge AI: A Position on Balancing ML-Attack Resistance and Real-World Deployment." Proceedings of the AAAI Symposium Series 5, no. 1 (2025): 167–71. https://doi.org/10.1609/aaaiss.v5i1.35584.
Повний текст джерелаCunha, Luís, João Sousa, José Azevedo, Sandro Pinto, and Tiago Gomes. "Security First, Safety Next: The Next-Generation Embedded Sensors for Autonomous Vehicles." Electronics 14, no. 11 (2025): 2172. https://doi.org/10.3390/electronics14112172.
Повний текст джерелаGómez-Marín, Ernesto, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo, and Davide Martintoni. "An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain." Applied Sciences 13, no. 18 (2023): 10477. http://dx.doi.org/10.3390/app131810477.
Повний текст джерелаLiang, Ziyuan, Qi’ao Jin, Zhiyong Wang, et al. "SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 819–43. http://dx.doi.org/10.46586/tches.v2024.i2.819-843.
Повний текст джерелаBoovaraghavan, Sudershan, Chen Chen, Anurag Maravi, et al. "Mites." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, no. 1 (2022): 1–32. http://dx.doi.org/10.1145/3580865.
Повний текст джерелаKorona, Mateusz, Radosław Giermakowski, Mateusz Biernacki, and Mariusz Rawski. "Lightweight Strong PUF for Resource-Constrained Devices." Electronics 13, no. 2 (2024): 351. http://dx.doi.org/10.3390/electronics13020351.
Повний текст джерелаZhu, Lianghong, Huaikun Xiang, and Kai Zhang. "A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks." Symmetry 14, no. 1 (2021): 46. http://dx.doi.org/10.3390/sym14010046.
Повний текст джерелаAsif, Rameez, Kinan Ghanem, and James Irvine. "Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy." Sensors 21, no. 1 (2020): 28. http://dx.doi.org/10.3390/s21010028.
Повний текст джерелаHardin, David. "Hardware/Software Co-Assurance for the Rust Programming Language Applied to Zero Trust Architecture Development." ACM SIGAda Ada Letters 42, no. 2 (2023): 55–61. http://dx.doi.org/10.1145/3591335.3591340.
Повний текст джерелаBernard, Florent, Viktor Fischer, and Boyan Valtchanov. "Mathematical model of physical RNGs based on coherent sampling." Tatra Mountains Mathematical Publications 45, no. 1 (2010): 1–14. http://dx.doi.org/10.2478/v10127-010-0001-1.
Повний текст джерелаChen, Xue Dong, and Bao Peng. "A Security Localization Method in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.186.193.
Повний текст джерелаFaisal Abdullah Althobaiti. "Lightweight cryptography for IoT: A comprehensive survey of algorithms, implementations, and standardization." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 516–25. https://doi.org/10.30574/wjaets.2025.15.3.0967.
Повний текст джерелаScholz, Alexander, Lukas Zimmermann, Axel Sikora, Mehdi B. Tahoori, and Jasmin Aghassi-Hagmann. "Embedded Analog Physical Unclonable Function System to Extract Reliable and Unique Security Keys." Applied Sciences 10, no. 3 (2020): 759. http://dx.doi.org/10.3390/app10030759.
Повний текст джерелаNoseda, Mario, Lea Zimmerli, Tobias Schläpfer, and Andreas Rüst. "Performance Analysis of Secure Elements for IoT." IoT 3, no. 1 (2021): 1–28. http://dx.doi.org/10.3390/iot3010001.
Повний текст джерелаUpadhyaya, Devanshi, Maël Gay, and Ilia Polian. "Locking-Enabled Security Analysis of Cryptographic Circuits." Cryptography 8, no. 1 (2024): 2. http://dx.doi.org/10.3390/cryptography8010002.
Повний текст джерелаHe, Jiaji, Guoqian Song, Qizhi Zhang, et al. "A Weak-PUF-Assisted Strong PUF with Inherent Security Using Metastability Implemented on FPGAs." Electronics 14, no. 5 (2025): 1007. https://doi.org/10.3390/electronics14051007.
Повний текст джерелаLiu, Botao, and Ming Tang. "MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes." IET Information Security 2024 (May 11, 2024): 1–17. http://dx.doi.org/10.1049/2024/8851878.
Повний текст джерелаSerrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, and Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3." Cryptography 6, no. 2 (2022): 30. http://dx.doi.org/10.3390/cryptography6020030.
Повний текст джерелаMadushan, Hasindu, Iftekhar Salam, and Janaka Alawatugoda. "A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses." Electronics 11, no. 24 (2022): 4199. http://dx.doi.org/10.3390/electronics11244199.
Повний текст джерелаMartin, Honorio, Pedro Martin-Holgado, Yolanda Morilla, Luis Entrena, and Enrique San-Millan. "Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs." Electronics 7, no. 9 (2018): 163. http://dx.doi.org/10.3390/electronics7090163.
Повний текст джерелаMaolood, Abeer Tariq, Alaa Kadhim Farhan, Wageda I. El-Sobky, et al. "Fast Novel Efficient S-Boxes with Expanded DNA Codes." Security and Communication Networks 2023 (April 18, 2023): 1–19. http://dx.doi.org/10.1155/2023/5767102.
Повний текст джерелаVytarani, Mathane, and V. Lakshmi P. "Multi-layer Attestation for Internet of Things using Blockchain." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 995–1000. https://doi.org/10.35940/ijeat.C4719.029320.
Повний текст джерелаChattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, and Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability." ACM Transactions on Design Automation of Electronic Systems 26, no. 6 (2021): 1–24. http://dx.doi.org/10.1145/3460004.
Повний текст джерела