Hardware

Results: 39400



#Item
1Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer  Science and Engineering, University of California, San Di

Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
    3A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

    A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-04-17 15:16:36
    4Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

    Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-05-28 15:36:33
    5Trojan-tolerant Hardware  + Supply Chain Security in Practice Vasilios Mavroudis

    Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

    Add to Reading List

    Source URL: backdoortolerance.org

    Language: English - Date: 2018-03-13 07:04:44
    6SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

    SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-03-21 11:51:07
    7Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

    Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-05-04 18:26:31
    8Hardware	Digital	Signatures Lionello	Lunesu Enuma	Technologies	Limited   Why?

    Hardware Digital Signatures Lionello Lunesu Enuma Technologies Limited Why?

    Add to Reading List

    Source URL: blog.enuma.io

    Language: English - Date: 2018-08-08 01:49:05
    9BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY

    BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY

    Add to Reading List

    Source URL: prof.ict.ac.cn

    Language: English - Date: 2018-04-01 04:31:31
    10Reconfigurable Hardware Implementation of Mesh Routing in the Number Field Sieve Factorization Sashisu Bajracharya1, Deapesh Misra1, Kris Gaj1, Tarek El-Ghazawi2 1

    Reconfigurable Hardware Implementation of Mesh Routing in the Number Field Sieve Factorization Sashisu Bajracharya1, Deapesh Misra1, Kris Gaj1, Tarek El-Ghazawi2 1

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2005-03-13 11:15:52