Hardware obfuscation

Results: 10



#Item
1Operator theory / Obfuscation / Complex analysis / Partial differential equations / Analysis

YSKSeparation Kit Installation The YSK-8100 consists of sub-panel mounting hardware, microphone connecting hardware and three 6-m interconnecting cables for the sub-panel. This allows the main body to be installed

Add to Reading List

Source URL: www.repeater-builder.com

Language: English - Date: 2013-01-02 07:20:50
2Semiconductor devices / Electronic design / Hardware Trojan / Trojans / Electronic engineering / Field-programmable gate array / Integrated circuit / Cryptographic engineering / Trojan horse / Hardware obfuscation

SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

Add to Reading List

Source URL: www.univ-st-etienne.fr

Language: English - Date: 2016-04-04 04:42:13
3

Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-06 22:25:01
    4

    Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation

    Add to Reading List

    Source URL: www.usenix.org

    - Date: 2014-02-27 22:49:53
      5Software / Obfuscated code / Source code / PreEmptive Solutions / Microsoft Visual Studio / ActionScript code protection / Hardware obfuscation / Computer programming / Obfuscation / Computing

      Obfuscation Development Process

      Add to Reading List

      Source URL: www.preemptive.com

      Language: English - Date: 2014-07-02 10:17:38
      6Electronic commerce / Cryptographic protocols / RSA / Cipher / Zero-knowledge proof / PP / Cryptography / Public-key cryptography / Homomorphic encryption

      Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M¨ uller-Quade, and Tobias Nilges Karlsruhe Institute of Technology, Karlsruhe, Germany

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-01-16 05:13:26
      7Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

      Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2007-03-08 09:17:59
      8Obfuscation / Obfuscated code / Source code / International Obfuscated C Code Contest / J / Hardware obfuscation / Computer programming / Software engineering / Computing

      Introduction to Program Obfuscation Yury Lifshits Saint-Petersburg State University http://logic.pdmi.ras.ru/˜yura/ [removed]

      Add to Reading List

      Source URL: yury.name

      Language: English - Date: 2006-08-19 21:36:28
      9Obfuscation / Obfuscated code / Source code / Scripting languages / Perl / Hardware obfuscation / Computer programming / Computing / Software engineering

      Obfuscation Concept Perspective Directions State of the Art

      Add to Reading List

      Source URL: yury.name

      Language: English - Date: 2006-01-02 14:43:50
      10Security / Semantic security / Advantage / Secrecy / Proxy re-encryption / Obfuscation / RSA / Encryption / Hardware obfuscation / Cryptography / Cyberwarfare / Ciphertext indistinguishability

      Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2010-02-04 10:25:07
      UPDATE