Hardware obfuscation

Results: 10



#Item
1YSKSeparation Kit Installation The YSK-8100 consists of sub-panel mounting hardware, microphone connecting hardware and three 6-m interconnecting cables for the sub-panel. This allows the main body to be installed

YSKSeparation Kit Installation The YSK-8100 consists of sub-panel mounting hardware, microphone connecting hardware and three 6-m interconnecting cables for the sub-panel. This allows the main body to be installed

Add to Reading List

Source URL: www.repeater-builder.com

Language: English - Date: 2013-01-02 07:20:50
2SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

Add to Reading List

Source URL: www.univ-st-etienne.fr

Language: English - Date: 2016-04-04 04:42:13
3Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗  Shafi Goldwasser‡

Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-06 22:25:01
    4Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation

    Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation

    Add to Reading List

    Source URL: www.usenix.org

    - Date: 2014-02-27 22:49:53
      5Obfuscation Development Process

      Obfuscation Development Process

      Add to Reading List

      Source URL: www.preemptive.com

      Language: English - Date: 2014-07-02 10:17:38
      6Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M¨ uller-Quade, and Tobias Nilges Karlsruhe Institute of Technology, Karlsruhe, Germany

      Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M¨ uller-Quade, and Tobias Nilges Karlsruhe Institute of Technology, Karlsruhe, Germany

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-01-16 05:13:26
      7Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2  CWI, Amsterdam,

      Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2007-03-08 09:17:59
      8Introduction to Program Obfuscation  Yury Lifshits Saint-Petersburg State University http://logic.pdmi.ras.ru/˜yura/ [removed]

      Introduction to Program Obfuscation Yury Lifshits Saint-Petersburg State University http://logic.pdmi.ras.ru/˜yura/ [removed]

      Add to Reading List

      Source URL: yury.name

      Language: English - Date: 2006-08-19 21:36:28
      9Obfuscation Concept  Perspective Directions State of the Art

      Obfuscation Concept Perspective Directions State of the Art

      Add to Reading List

      Source URL: yury.name

      Language: English - Date: 2006-01-02 14:43:50
      10Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum†  abhi shelat‡

      Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2010-02-04 10:25:07