Hardware security

Results: 1760



#Item
1Cryptography / Computer security / Computer hardware / Cyberwarfare / ISO standards / Hardware Trojan / Hardware security module / Secure cryptoprocessor / Hardware security / Trusted Platform Module / Smart card

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Cryptography / Computer security / Computer hardware / Hardware security module / Hardware security / Tamper resistance

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
3Algebra / Linear algebra / Mathematics / Numerical linear algebra / Matrices / Matrix theory / Multiplication / Gaussian elimination / Matrix multiplication / Pivot element / Invertible matrix / Matrix

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:51:07
4Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
5

Unlocking Wealth from the Blockchain for Everyone 5M White Paper Token Security Scheme (TSS) incorporating Distributed Hardware Security Modules (DHSMs) for

Add to Reading List

Source URL: www.tsstoken.com

Language: English - Date: 2017-10-16 11:52:14
    6

    Séminaire sur l’Intégration en Microélectronique Hardware-Security and Trust: Counterfeit and hardware Trojans 24 MarsSalle de séminaire du LIRMM (Bat. 4) 9h30 : Accueil (Pascal Nouet) puis Introduction de

    Add to Reading List

    Source URL: www.lirmm.fr

    Language: English
      7

      REGISTRATION DOCUMENT SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

      Add to Reading List

      Source URL: www.youthfund.go.ke

      Language: English - Date: 2017-05-24 13:41:29
        8

        Wohlstand aus der Blockchain für alle 5M White Paper Token Security Scheme (TSS) mit Einbindung von Distributed Hardware Security Modules (DHSMs) für Crypto-Currencies Key Management System (CKMS) im

        Add to Reading List

        Source URL: www.tsstoken.com

        Language: German - Date: 2017-11-01 18:15:36
          9

          Use ITAM to track and maintain hardware and software assets through their entire lifecycle, reclaim unused licenses, support security efforts, manage vendors and contracts, and cut costs up to 50%.9

          Add to Reading List

          Source URL: rs.ivanti.com

          - Date: 2017-11-03 12:53:21
            10

            HSM Hardware Security Modules Jakob Schlyter – !"#$" 1

            Add to Reading List

            Source URL: www.iis.se

              UPDATE