Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Hardware Security Primitives.

Статті в журналах з теми "Hardware Security Primitives"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Hardware Security Primitives".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Labrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Huffmire, Ted, Timothy Levin, Thuy Nguyen, et al. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.

Повний текст джерела
Анотація:
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (2018): 48. http://dx.doi.org/10.3390/jlpea8040048.

Повний текст джерела
Анотація:
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, et al. "Emerging Technology-Based Design of Primitives for Hardware Security." ACM Journal on Emerging Technologies in Computing Systems 13, no. 1 (2016): 1–19. http://dx.doi.org/10.1145/2816818.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dubrova, Elena. "Energy-efficient cryptographic primitives." Facta universitatis - series: Electronics and Energetics 31, no. 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.

Повний текст джерела
Анотація:
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem. First, we show how to design cryptographic primitives which can assure integrity and confidentiality of transmitted messages while satisfying resource constrains of low-end low-cost wireless devices such as sensors or RFID tags. Second, we describe countermeasures which can enhan
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Müller, Nicolai, and Amir Moradi. "Automated Generation of Fault-Resistant Circuits." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 136–73. http://dx.doi.org/10.46586/tches.v2024.i3.136-173.

Повний текст джерела
Анотація:
Fault Injection (FI) attacks, which involve intentionally introducing faults into a system to cause it to behave in an unintended manner, are widely recognized and pose a significant threat to the security of cryptographic primitives implemented in hardware, making fault tolerance an increasingly critical concern. However, protecting cryptographic hardware primitives securely and efficiently, even with wellestablished and documented methods such as redundant computation, can be a timeconsuming, error-prone, and expertise-demanding task. In this research, we present a comprehensive and fully-au
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Venkataraman, Anusha, Eberechukwu Amadi, and Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks." Micro 2, no. 3 (2022): 361–68. http://dx.doi.org/10.3390/micro2030024.

Повний текст джерела
Анотація:
Nanomaterials are promising alternatives for creating hardware security primitives that are considered more robust and less susceptible to physical attacks compared to standard CMOS-based approaches. Here, nanoscale electronic circuits composed of tunable ratios of molecules and colloidal nanoparticles formed via self-assembly on silicon wafers are investigated for information and hardware security by utilizing device-level physical variations induced during fabrication. Two-terminal electronic transport measurements show variations in current through different parts of the nanoscale network,
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.

Повний текст джерела
Анотація:
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute effi­ciently in hardware. 128-bit security, with no known security weaknesses is claimed by Rabbit's designers. Since hardware performance of Rabbit was only estimated in the proposal of algorithm, comparison of direct and optimized FPGA im­plementations of Rabbit stream cipher is presented, ide
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tsantikidou, Kyriaki, and Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare." Cryptography 6, no. 3 (2022): 45. http://dx.doi.org/10.3390/cryptography6030045.

Повний текст джерела
Анотація:
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity and authenticity of IoT-based designs are crucial in the health domain because the collected data are sensitive, and the continuous availability of the system is critical for the user’s wellbeing. However, the IoT consists of resource-constrained devices that increase the difficulty of implementing high-level-security schemes. Therefore, in the current paper, renowned lightweight cryptographic primitives and
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Liu, Guoxiao, Keting Jia, Puwen Wei, and Lei Ju. "High-Performance Hardware Implementation of MPCitH and Picnic3." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 190–214. http://dx.doi.org/10.46586/tches.v2024.i2.190-214.

Повний текст джерела
Анотація:
Picnic is a post-quantum digital signature, the security of which relies solely on symmetric-key primitives such as block ciphers and hash functions instead of number theoretic assumptions. One of the main concerns of Picnic is the large signature size. Although Katz et al.’s protocol (MPCitH-PP) significantly reduces the size of Picnic, the involvement of more parties in MPCitH-PP leads to longer signing/verification times and more hardware resources. This poses new challenges for implementing high-performance Picnic on resource-constrained FPGAs. So far as we know, current works on the hardw
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Preetisudha Meher, Lukram Dhanachandra Singh,. "Advancing Hardware Security: A Review and Novel Design of Configurable Arbiter PUF with DCM-Induced Metastability for Enhanced Resource Efficiency and Unpredictability." Tuijin Jishu/Journal of Propulsion Technology 45, no. 01 (2024): 3804–16. http://dx.doi.org/10.52783/tjjpt.v45.i01.4934.

Повний текст джерела
Анотація:
As the Internet of Things (IoT) and Blockchain technologies continue to assert their dominance in the technical landscape, the demand to enhance security measures becomes foremost. In this context, Physical Unclonable Functions (PUFs) are widely used hardware security primitives that can be used to solve a wide range of security issues. To support hardware security solutions, this paper presents an extensive overview and analysis of the existing Physical Unclonable Functions (PUFs) used as True Random Number Generators (TRNGs). Recognizing the shortcomings of current PUF designs, we propose a
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Chakraborty, Suvradip, Janaka Alawatugoda, and Chandrasekaran Pandu Rangan. "New approach to practical leakage-resilient public-key cryptography." Journal of Mathematical Cryptology 14, no. 1 (2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.

Повний текст джерела
Анотація:
AbstractWe present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings. We then show a secure construction of the LR-NIKE protocol in the BML setting that achieves an optimal leakage rate, i.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Meschkov, Sergej, Daniel Lammers, Mehdi B. Tahoori, and Amir Moradi. "Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 542–82. https://doi.org/10.46586/tches.v2025.i3.542-582.

Повний текст джерела
Анотація:
The increasing prevalence of security breaches highlights the importanceof robust hardware security measures. Among these breaches, physical attacks– such as Side-Channel Analysis ( SCA) and Fault Injection (FI ) attacks – posea significant challenge for security-sensitive applications. To ensure robust systemsecurity throughout its lifecycle, hardware security updates are indispensable alongsidesoftware security patches. Programmable hardware plays a pivotal role in establishinga robust hardware root-of-trust, serving to effectively mitigate various hardwaresecurity threats. In this paper, we
Стилі APA, Harvard, Vancouver, ISO та ін.
15

PAVANELLO, Fabio. "Lighting the way to better security - The NEUROPULS photonics-based approach." HiPEAC info, no. 72 (June 27, 2024): 20–21. https://doi.org/10.5281/zenodo.12565070.

Повний текст джерела
Анотація:
The expansion of edge computing is posing new challenges for cybersecurity: solutions need to offer robust security with low energy and low latency. To answer this challenge, the NEUROPULS project, funded by the European Union (EU), is taking a novel, neuromorphic approach, developing photonics-based hardware security primitives that draw on the properties of light for robust, yet lightweight, cybersecurity layers. HiPEAC caught up with NEUROPULS coordinator Fabio Pavanello (CNRS – Center for Radiofrequencies, Optics, and Microelectronics in the Alps – CROMA laboratory) to find out
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Amsaad, Fathi, Mohammed Niamat, Amer Dawoud, and Selcuk Kose. "Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks." Information 9, no. 9 (2018): 224. http://dx.doi.org/10.3390/info9090224.

Повний текст джерела
Анотація:
Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF design, experimental results show that the proposed d-ROPUF technique allows the generation of larger and updated challenge-response pairs (CRP space) compared with simple ROPUF. Additionally, an innovative hardware-oriented security algorithm, namely
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Chung, Kai-Min, Marios Georgiou, Ching-Yi Lai, and Vassilis Zikas. "Cryptography with Disposable Backdoors." Cryptography 3, no. 3 (2019): 22. http://dx.doi.org/10.3390/cryptography3030022.

Повний текст джерела
Анотація:
Backdooring cryptographic algorithms is an indisputable taboo in the cryptographic literature for a good reason: however noble the intentions, backdoors might fall in the wrong hands, in which case security is completely compromised. Nonetheless, more and more legislative pressure is being produced to enforce the use of such backdoors. In this work we introduce the concept of disposable cryptographic backdoors which can be used only once and become useless after that. These exotic primitives are impossible in the classical digital world without stateful and secure trusted hardware support, but
Стилі APA, Harvard, Vancouver, ISO та ін.
18

El Hadj Youssef, Wajih, Ali Abdelli, Fethi Dridi, and Mohsen Machhout. "Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications." Security and Communication Networks 2020 (November 29, 2020): 1–13. http://dx.doi.org/10.1155/2020/8860598.

Повний текст джерела
Анотація:
The recent expansion of the Internet of Things is creating a new world of smart devices in which security implications are very significant. Besides the claimed security level, the IoT devices are usually featured with constrained resources, such as low computation capability, low memory, and limited battery. Lightweight cryptographic primitives are proposed in the context of IoT while considering the trade-off between security guarantee and good performance. In this paper, we present optimized hardware, lightweight cryptographic designs, of 32-bit datapath, LED 64/128, SIMON 64/128, and SIMEC
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Misono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.

Повний текст джерела
Анотація:
Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the programmability and usability challenges of the previously proposed enclave-based trusted computing technologies. CVM hardware extensions facilitate secure, hardware-isolated encrypted VMs, promoting programmability and easier deployment in cloud infrastructures. However, differing microarchitectural features, interfaces, and security properties among hardwa
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Lara-Nino, Carlos Andres, Arturo Diaz-Perez, and Miguel Morales-Sandoval. "Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN." Security and Communication Networks 2018 (September 4, 2018): 1–14. http://dx.doi.org/10.1155/2018/5087065.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSN) aim at linking the cyber and physical worlds. Their security has taken relevance due to the sensitive data these networks might process under unprotected physical and cybernetic environments. The operational constraints in the sensor nodes demand security primitives with small implementation size and low power consumption. Authenticated encryption is a mechanism to provide these systems with confidentiality, integrity, and authentication of sensitive data. In this paper we explore hardware implementation alternatives of authenticated encryption through generic co
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Russinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy." Queue 21, no. 4 (2023): 44–48. http://dx.doi.org/10.1145/3623461.

Повний текст джерела
Анотація:
Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation. This means services can be designed that segment data based on least-privilege access principles, while all other code in the system sees only encrypted data. Crucially, the isolation is rooted in novel hardware primitives, effe
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Bathalapalli, Venkata K. V. V., Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer, and Bibhudutta Rout. "PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems." Sensors 24, no. 3 (2024): 938. http://dx.doi.org/10.3390/s24030938.

Повний текст джерела
Анотація:
This article presents a novel hardware-assisted distributed ledger-based solution for simultaneous device and data security in smart healthcare. This article presents a novel architecture that integrates PUF, blockchain, and Tangle for Security-by-Design (SbD) of healthcare cyber–physical systems (H-CPSs). Healthcare systems around the world have undergone massive technological transformation and have seen growing adoption with the advancement of Internet-of-Medical Things (IoMT). The technological transformation of healthcare systems to telemedicine, e-health, connected health, and remote hea
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Avani, Dave, and Dave Krunal. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.13337765.

Повний текст джерела
Анотація:
The advancement of industrial 4.0 has increased the utilization of resource constrained embedded and IOT devices in application ranging from Internet of Things (<em>IoT</em>) and CyberPhysical Systems (<em>CPS</em>). These systems are often involve in security-critical user data and/or information transfers. This makes them increasingly popular target for attacks to gain access of security-critical user data and/or information. The resiliency of a system is defined by its ability to detect, prevent and recover from the attacks. Crypto primitives such as secure boot, attestation, TPM, control f
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Krunal, Dave, and Dave Avani. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.12772515.

Повний текст джерела
Анотація:
The advancement of industrial 4.0 has increased the utilization of resource constrained embedded and IOT devices in application ranging from Internet of Things (<em>IoT</em>) and CyberPhysical Systems (<em>CPS</em>). These systems are often involve in security-critical user data and/or information transfers. This makes them increasingly popular target for attacks to gain access of security-critical user data and/or information. The resiliency of a system is defined by its ability to detect, prevent and recover from the attacks. Crypto primitives such as secure boot, attestation, TPM, control f
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Marin, Leandro, Antonio Jara, and Antonio Skarmeta. "Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2368–84. https://doi.org/10.3217/jucs-019-16-2368.

Повний текст джерела
Анотація:
Cryptographic primitives are the key component in the security protocols to support the authentication, key management and secure communication establishment. For that reason, this work presents the optimization of the Elliptic Curve Cryptography through the usage of Shifting Primes for constrained devices. Specifically, this presents the optimization for the chipsets JN51XX from NXP/Jennic, which are based on OpenRISC architecture and offer a class-2 constrained device. In details, Shifting Primes features have allowed to optimize the multiplication and squaring through a double accumulator a
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Al-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane, and Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT." Sensors 20, no. 7 (2020): 1963. http://dx.doi.org/10.3390/s20071963.

Повний текст джерела
Анотація:
The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a cen
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Nili, Hussein, Gina C. Adam, Brian Hoskins, et al. "Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors." Nature Electronics 1, no. 3 (2018): 197–202. http://dx.doi.org/10.1038/s41928-018-0039-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Li, Gaoxiang, and Yu Zhuang. "Rethinking PUF Design for Scalable Edge AI: A Position on Balancing ML-Attack Resistance and Real-World Deployment." Proceedings of the AAAI Symposium Series 5, no. 1 (2025): 167–71. https://doi.org/10.1609/aaaiss.v5i1.35584.

Повний текст джерела
Анотація:
Generative and embedded AI are rapidly migrating from centralized cloud infrastructures to resource-constrained edge devices. While this shift promises reduced latency and improved data privacy, it also creates challenging security and scalability trade-offs. Physical Unclonable Functions (PUFs) are widely touted as low-overhead hardware security primitives suitable for edge and IoT scenarios, yet most existing work emphasizes resistance to machine learning (ML) attacks at the expense of authorized modelability—the ability for trusted entities to accurately model PUF behavior without storing m
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Cunha, Luís, João Sousa, José Azevedo, Sandro Pinto, and Tiago Gomes. "Security First, Safety Next: The Next-Generation Embedded Sensors for Autonomous Vehicles." Electronics 14, no. 11 (2025): 2172. https://doi.org/10.3390/electronics14112172.

Повний текст джерела
Анотація:
The automotive industry is fully shifting towards autonomous connected vehicles. By advancing vehicles’ intelligence and connectivity, the industry has enabled innovative functions such as advanced driver assistance systems (ADAS) in the direction of driverless cars. Such functions are often referred to as cyber-physical features, since almost all of them require collecting data from the physical environment to make automotive operation decisions and properly actuate in the physical world. However, increased functionalities result in increased complexity, which causes serious security vulnerab
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Gómez-Marín, Ernesto, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo, and Davide Martintoni. "An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain." Applied Sciences 13, no. 18 (2023): 10477. http://dx.doi.org/10.3390/app131810477.

Повний текст джерела
Анотація:
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based solutions. Unfortunately, blockchain cannot guarantee the provenance and accuracy of the stored information. To overcome such a limitation, this paper proposes a secure solution to strongly rely on the tracking information of the physical assets in the supply chain. The proposed solution exploits Hardware Sec
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Liang, Ziyuan, Qi’ao Jin, Zhiyong Wang, et al. "SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 819–43. http://dx.doi.org/10.46586/tches.v2024.i2.819-843.

Повний текст джерела
Анотація:
Secure multi-party computation and homomorphic encryption are two primary security primitives in privacy-preserving machine learning, whose wide adoption is, nevertheless, constrained by the computation and network communication overheads. This paper proposes a hybrid Secret-sharing and Homomorphic encryption Architecture for Privacy-pERsevering machine learning (SHAPER). SHAPER protects sensitive data in encrypted or randomly shared domains instead of relying on a trusted third party. The proposed algorithm-protocol-hardware co-design methodology explores techniques such as plaintext Single I
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Boovaraghavan, Sudershan, Chen Chen, Anurag Maravi, et al. "Mites." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, no. 1 (2022): 1–32. http://dx.doi.org/10.1145/3580865.

Повний текст джерела
Анотація:
There is increasing interest in deploying building-scale, general-purpose, and high-fidelity sensing to drive emerging smart building applications. However, the real-world deployment of such systems is challenging due to the lack of system and architectural support. Most existing sensing systems are purpose-built, consisting of hardware that senses a limited set of environmental facets, typically at low fidelity and for short-term deployment. Furthermore, prior systems with high-fidelity sensing and machine learning fail to scale effectively and have fewer primitives, if any, for privacy and s
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Korona, Mateusz, Radosław Giermakowski, Mateusz Biernacki, and Mariusz Rawski. "Lightweight Strong PUF for Resource-Constrained Devices." Electronics 13, no. 2 (2024): 351. http://dx.doi.org/10.3390/electronics13020351.

Повний текст джерела
Анотація:
Physical Unclonable Functions are security primitives that exploit the variation in integrated circuits’ manufacturing process, and, as a result, each instance processes applied stimuli differently. This feature can be used to provide a unique fingerprint of the electronic device, or as an interesting alternative to classic key storage methods. Due to their nature, they are often considered an element of the Internet of Things nodes. However, their application heavily depends on resource consumption. Lightweight architectures are proposed in the literature but are technology-dependent or still
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Zhu, Lianghong, Huaikun Xiang, and Kai Zhang. "A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks." Symmetry 14, no. 1 (2021): 46. http://dx.doi.org/10.3390/sym14010046.

Повний текст джерела
Анотація:
Recently, wireless sensor networks (WSNs) have been widely used in a variety of fields, and make people’s lives more convenient and efficient. However, WSNs are usually deployed in a harsh and insecure environment. Furthermore, sensors with limited hardware resources have a low capacity for data processing and communication. For these reasons, research on efficient and secure real-time authentication and key agreement protocols based on the characteristics of WSNs has gradually attracted the attention of academics. Although many schemes have been proposed, most of them cannot achieve all known
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Asif, Rameez, Kinan Ghanem, and James Irvine. "Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy." Sensors 21, no. 1 (2020): 28. http://dx.doi.org/10.3390/s21010028.

Повний текст джерела
Анотація:
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Hardin, David. "Hardware/Software Co-Assurance for the Rust Programming Language Applied to Zero Trust Architecture Development." ACM SIGAda Ada Letters 42, no. 2 (2023): 55–61. http://dx.doi.org/10.1145/3591335.3591340.

Повний текст джерела
Анотація:
Zero Trust Architecture requirements are of increasing importance in critical systems development. Zero trust tenets hold that no implicit trust be granted to assets based on their physical or network location. Zero Trust development focuses on authentication, authorization, and shrinking implicit trust zones to the most granular level possible, while maintaining availability and minimizing authentication latency. Performant, high-assurance cryptographic primitives are thus central to successfully realizing a Zero Trust Architecture. The Rust programming language has garnered significant inter
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Bernard, Florent, Viktor Fischer, and Boyan Valtchanov. "Mathematical model of physical RNGs based on coherent sampling." Tatra Mountains Mathematical Publications 45, no. 1 (2010): 1–14. http://dx.doi.org/10.2478/v10127-010-0001-1.

Повний текст джерела
Анотація:
ABSTRACT Random number generators represent one of basic cryptographic primitives used in creating cryptographic protocols. Their security evaluation represents very important part in the design, implementation and employment phase of the generator. One of important security requirements is the existence of a mathematical model describing the physical noise source and the statistical properties of the digitized noise derived from it. The aim of this paper is to propose the model of a class of generators using two jittery clocks with rationally related frequencies. The clock signals with relate
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Chen, Xue Dong, and Bao Peng. "A Security Localization Method in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.186.193.

Повний текст джерела
Анотація:
In this paper, we address wireless sensor network localization problems that have high reliability in an environment where physical node destruction is possible. We propose a range-independent location algorithm called security location based on genetic algorithm (GASL) that allows sensors to passively determine their location with high reliability, without increasing the number of reference points, or the complexity of the hardware of each reference point or node. In GASL, sensors determine their location based on the optimization of select function by the reliability by aim at some reference
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Faisal Abdullah Althobaiti. "Lightweight cryptography for IoT: A comprehensive survey of algorithms, implementations, and standardization." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 516–25. https://doi.org/10.30574/wjaets.2025.15.3.0967.

Повний текст джерела
Анотація:
The Internet of Things (IoT) paradigm has enabled seamless connectivity among billions of constrained devices—sensors, actuators, and smart appliances—yet securing these networks remains a critical challenge. Traditional cryptographic primitives often exceed typical IoT endpoints' power, memory, and latency budgets. This paper thoroughly surveys lightweight cryptography specifically designed for Internet of Things (IoT) environments. We first introduce a taxonomy of algorithmic families—including block and stream ciphers, public-key schemes, and hash functions—and review recent proposals that
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Scholz, Alexander, Lukas Zimmermann, Axel Sikora, Mehdi B. Tahoori, and Jasmin Aghassi-Hagmann. "Embedded Analog Physical Unclonable Function System to Extract Reliable and Unique Security Keys." Applied Sciences 10, no. 3 (2020): 759. http://dx.doi.org/10.3390/app10030759.

Повний текст джерела
Анотація:
Internet of Things (IoT) enabled devices have become more and more pervasive in our everyday lives. Examples include wearables transmitting and processing personal data and smart labels interacting with customers. Due to the sensitive data involved, these devices need to be protected against attackers. In this context, hardware-based security primitives such as Physical Unclonable Functions (PUFs) provide a powerful solution to secure interconnected devices. The main benefit of PUFs, in combination with traditional cryptographic methods, is that security keys are derived from the random intrin
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Noseda, Mario, Lea Zimmerli, Tobias Schläpfer, and Andreas Rüst. "Performance Analysis of Secure Elements for IoT." IoT 3, no. 1 (2021): 1–28. http://dx.doi.org/10.3390/iot3010001.

Повний текст джерела
Анотація:
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devices need to fulfil similar security requirements as conventional computers. The challenge is to leverage well-known cybersecurity techniques for such devices without dramatically increasing power consumption (and therefore reducing battery lifetime) or the cost regarding memory sizes and required processor performance. Various semiconductor vend
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Upadhyaya, Devanshi, Maël Gay, and Ilia Polian. "Locking-Enabled Security Analysis of Cryptographic Circuits." Cryptography 8, no. 1 (2024): 2. http://dx.doi.org/10.3390/cryptography8010002.

Повний текст джерела
Анотація:
Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit against one threat can make it more vulnerable against a different threat. In this article, we study the consequences of applying logic locking, a popular design-for-trust solution against intellectual property piracy and overproduction, to cryptographic circuits. We show that the ability to unlock the circuit incorrectly gives the adversary new powerful
Стилі APA, Harvard, Vancouver, ISO та ін.
43

He, Jiaji, Guoqian Song, Qizhi Zhang, et al. "A Weak-PUF-Assisted Strong PUF with Inherent Security Using Metastability Implemented on FPGAs." Electronics 14, no. 5 (2025): 1007. https://doi.org/10.3390/electronics14051007.

Повний текст джерела
Анотація:
Physical unclonable functions (PUFs) are emerging as highly promising lightweight hardware security primitives that offer novel information security solutions. PUFs capitalize on the intrinsic physical variations within circuits to generate unpredictable responses. Nevertheless, diverse PUF types often encounter difficulties in concurrently fulfilling multiple performance requisites. As is well known, strong PUFs possess significantly larger challenge–response pair (CRP) set sizes. However, they are vulnerable to machine learning (ML) attacks. Conversely, weak PUFs generate responses with supe
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Liu, Botao, and Ming Tang. "MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes." IET Information Security 2024 (May 11, 2024): 1–17. http://dx.doi.org/10.1049/2024/8851878.

Повний текст джерела
Анотація:
Threshold implementation (TI) is a lightweight countermeasure against side-channel attacks when glitches happen. As to masking schemes, an S-box is the key part to protection. In this paper, we propose a general first-order lightweight TI scheme for 4 × 4 S-boxes and name it as MiniSat-lightweight-threshold implementation (MS-LW-TI). First, we use MiniSat to optimally decompose an S-box into the least number of three different logic gate operations, AND, OR, and XOR. Among these operations, we define two primitives and the extension of two primitives for TI design. Furthermore, we prove that t
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Serrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, and Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3." Cryptography 6, no. 2 (2022): 30. http://dx.doi.org/10.3390/cryptography6020030.

Повний текст джерела
Анотація:
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced Encryption Standard (AES). However, the few implementations cannot provide sufficient speed compared to other encryption standards with Authenticated Encryption with Associated Data (AEAD). This paper shows ChaCha20 and Poly1305 primitives. In addition, a compatible ChaCha20–Poly1305 AEAD with TLS 1.3 is implemented with a fault detector to reduce th
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Madushan, Hasindu, Iftekhar Salam, and Janaka Alawatugoda. "A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses." Electronics 11, no. 24 (2022): 4199. http://dx.doi.org/10.3390/electronics11244199.

Повний текст джерела
Анотація:
The security of resource-constrained devices is critical in the IoT field, given that everything is interconnected. Therefore, the National Institute of Standards and Technology (NIST) initialized the lightweight cryptography (LWC) project to standardize the lightweight cryptography algorithms for resource-constrained devices. After two rounds, the NIST announced the finalists in 2021. The finalist algorithms are Ascon, Elephant, GIFT-COFB, Grain-128AEAD, ISAP, PHOTON-Beetle, Romulus, SPARKLE, TinyJambu, and Xoodyak. The final round of the competition is still in progress, and the NIST will se
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Martin, Honorio, Pedro Martin-Holgado, Yolanda Morilla, Luis Entrena, and Enrique San-Millan. "Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs." Electronics 7, no. 9 (2018): 163. http://dx.doi.org/10.3390/electronics7090163.

Повний текст джерела
Анотація:
Physical Unclonable Functions (PUFs) are hardware security primitives that are increasingly being used for authentication and key generation in ICs and FPGAs. For space systems, they are a promising approach to meet the needs for secure communications at low cost. To this purpose, it is essential to determine if they are reliable in the space radiation environment. In this work we evaluate the Total Ionizing Dose effects on a delay-based PUF implemented in SRAM-FPGA, namely a Ring Oscillator PUF. Several major quality metrics have been used to analyze the evolution of the PUF response with the
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Maolood, Abeer Tariq, Alaa Kadhim Farhan, Wageda I. El-Sobky, et al. "Fast Novel Efficient S-Boxes with Expanded DNA Codes." Security and Communication Networks 2023 (April 18, 2023): 1–19. http://dx.doi.org/10.1155/2023/5767102.

Повний текст джерела
Анотація:
IoT is one of the most popular technologies in recent years due to the interconnection of various infrastructures, physical devices, and software. To guarantee the security of Internet of Things (IoT) pervasiveness, lightweight cryptographic solutions are needed and this requires lightweight cryptographic primitives. The choice of S-box in light block ciphers plays an important role in characterizing the security-performance trade-off. The choice of the 4 × 4 S-box for the lightweight constructions results in compact hardware, speeding up the computational capability of the security algorithm
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Vytarani, Mathane, and V. Lakshmi P. "Multi-layer Attestation for Internet of Things using Blockchain." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 995–1000. https://doi.org/10.35940/ijeat.C4719.029320.

Повний текст джерела
Анотація:
Internet of Things (IOT) by its nature comprises of heterogeneous devices with varying degree of resources and capabilities with common attributes that those are connected and uniquely identifiable over the network. Given the always on always connected nature of IoT devices along with virtually limitless applications, the attack surface of constituent IoT device is very large. Hence ability to attest IoT devices for its trustworthiness is very important factor in determining trustworthiness of IoT network. In past significant amount of research has focused on possible attestation mechanisms fo
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Chattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, and Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability." ACM Transactions on Design Automation of Electronic Systems 26, no. 6 (2021): 1–24. http://dx.doi.org/10.1145/3460004.

Повний текст джерела
Анотація:
Physically Unclonable Function (PUF) circuits are promising low-overhead hardware security primitives, but are often gravely susceptible to machine learning–based modeling attacks. Recently, chaotic PUF circuits have been proposed that show greater robustness to modeling attacks. However, they often suffer from unacceptable overhead, and their analog components are susceptible to low reliability. In this article, we propose the concept of a conditionally chaotic PUF that enhances the reliability of the analog components of a chaotic PUF circuit to a level at par with their digital counterparts
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!