Hardware security

Results: 1760



#Item
1Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Trojan-tolerant Hardware  + Supply Chain Security in Practice Vasilios Mavroudis

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
3SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:51:07
4On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
5Unlocking Wealth from the Blockchain for Everyone  5M White Paper Token Security Scheme (TSS) incorporating Distributed Hardware Security Modules (DHSMs) for

Unlocking Wealth from the Blockchain for Everyone 5M White Paper Token Security Scheme (TSS) incorporating Distributed Hardware Security Modules (DHSMs) for

Add to Reading List

Source URL: www.tsstoken.com

Language: English - Date: 2017-10-16 11:52:14
    6Séminaire sur l’Intégration en Microélectronique Hardware-Security and Trust: Counterfeit and hardware Trojans 24 MarsSalle de séminaire du LIRMM (Bat. 4) 9h30 : Accueil (Pascal Nouet) puis Introduction de

    Séminaire sur l’Intégration en Microélectronique Hardware-Security and Trust: Counterfeit and hardware Trojans 24 MarsSalle de séminaire du LIRMM (Bat. 4) 9h30 : Accueil (Pascal Nouet) puis Introduction de

    Add to Reading List

    Source URL: www.lirmm.fr

    Language: English
      7REGISTRATION DOCUMENT  SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

      REGISTRATION DOCUMENT SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

      Add to Reading List

      Source URL: www.youthfund.go.ke

      Language: English - Date: 2017-05-24 13:41:29
        8Wohlstand aus der Blockchain für alle  5M White Paper Token Security Scheme (TSS) mit Einbindung von Distributed Hardware Security Modules (DHSMs) für Crypto-Currencies Key Management System (CKMS) im

        Wohlstand aus der Blockchain für alle 5M White Paper Token Security Scheme (TSS) mit Einbindung von Distributed Hardware Security Modules (DHSMs) für Crypto-Currencies Key Management System (CKMS) im

        Add to Reading List

        Source URL: www.tsstoken.com

        Language: German - Date: 2017-11-01 18:15:36
          9Use ITAM to track and maintain hardware and software assets through their entire lifecycle, reclaim unused licenses, support security efforts, manage vendors and contracts, and cut costs up to 50%.9

          Use ITAM to track and maintain hardware and software assets through their entire lifecycle, reclaim unused licenses, support security efforts, manage vendors and contracts, and cut costs up to 50%.9

          Add to Reading List

          Source URL: rs.ivanti.com

          - Date: 2017-11-03 12:53:21
            10HSM Hardware Security Modules Jakob Schlyter –  !

            HSM Hardware Security Modules Jakob Schlyter – !"#$" 1

            Add to Reading List

            Source URL: www.iis.se