Journal articles on the topic 'Hardware Security Primitives'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hardware Security Primitives.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Labrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (November 1, 2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Full textHuffmire, Ted, Timothy Levin, Thuy Nguyen, Cynthia Irvine, Brett Brotherton, Gang Wang, Timothy Sherwood, and Ryan Kastner. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (May 2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.
Full textGordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (February 4, 2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Full textZhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (November 27, 2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Full textBi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier, and Yier Jin. "Emerging Technology-Based Design of Primitives for Hardware Security." ACM Journal on Emerging Technologies in Computing Systems 13, no. 1 (December 6, 2016): 1–19. http://dx.doi.org/10.1145/2816818.
Full textDubrova, Elena. "Energy-efficient cryptographic primitives." Facta universitatis - series: Electronics and Energetics 31, no. 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.
Full textVenkataraman, Anusha, Eberechukwu Amadi, and Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks." Micro 2, no. 3 (June 21, 2022): 361–68. http://dx.doi.org/10.3390/micro2030024.
Full textTsantikidou, Kyriaki, and Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare." Cryptography 6, no. 3 (September 1, 2022): 45. http://dx.doi.org/10.3390/cryptography6030045.
Full textTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (December 1, 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Full textPreetisudha Meher, Lukram Dhanachandra Singh,. "Advancing Hardware Security: A Review and Novel Design of Configurable Arbiter PUF with DCM-Induced Metastability for Enhanced Resource Efficiency and Unpredictability." Tuijin Jishu/Journal of Propulsion Technology 45, no. 01 (February 16, 2024): 3804–16. http://dx.doi.org/10.52783/tjjpt.v45.i01.4934.
Full textChakraborty, Suvradip, Janaka Alawatugoda, and Chandrasekaran Pandu Rangan. "New approach to practical leakage-resilient public-key cryptography." Journal of Mathematical Cryptology 14, no. 1 (July 11, 2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.
Full textAmsaad, Fathi, Mohammed Niamat, Amer Dawoud, and Selcuk Kose. "Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks." Information 9, no. 9 (September 3, 2018): 224. http://dx.doi.org/10.3390/info9090224.
Full textEl Hadj Youssef, Wajih, Ali Abdelli, Fethi Dridi, and Mohsen Machhout. "Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications." Security and Communication Networks 2020 (November 29, 2020): 1–13. http://dx.doi.org/10.1155/2020/8860598.
Full textBathalapalli, Venkata K. V. V., Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer, and Bibhudutta Rout. "PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems." Sensors 24, no. 3 (January 31, 2024): 938. http://dx.doi.org/10.3390/s24030938.
Full textLara-Nino, Carlos Andres, Arturo Diaz-Perez, and Miguel Morales-Sandoval. "Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN." Security and Communication Networks 2018 (September 4, 2018): 1–14. http://dx.doi.org/10.1155/2018/5087065.
Full textRussinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy." Queue 21, no. 4 (August 31, 2023): 44–48. http://dx.doi.org/10.1145/3623461.
Full textChung, Kai-Min, Marios Georgiou, Ching-Yi Lai, and Vassilis Zikas. "Cryptography with Disposable Backdoors." Cryptography 3, no. 3 (August 20, 2019): 22. http://dx.doi.org/10.3390/cryptography3030022.
Full textAl-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane, and Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT." Sensors 20, no. 7 (March 31, 2020): 1963. http://dx.doi.org/10.3390/s20071963.
Full textNili, Hussein, Gina C. Adam, Brian Hoskins, Mirko Prezioso, Jeeson Kim, M. Reza Mahmoodi, Farnood Merrikh Bayat, Omid Kavehei, and Dmitri B. Strukov. "Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors." Nature Electronics 1, no. 3 (March 2018): 197–202. http://dx.doi.org/10.1038/s41928-018-0039-7.
Full textGómez-Marín, Ernesto, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo, and Davide Martintoni. "An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain." Applied Sciences 13, no. 18 (September 19, 2023): 10477. http://dx.doi.org/10.3390/app131810477.
Full textBoovaraghavan, Sudershan, Chen Chen, Anurag Maravi, Mike Czapik, Yang Zhang, Chris Harrison, and Yuvraj Agarwal. "Mites." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, no. 1 (March 27, 2022): 1–32. http://dx.doi.org/10.1145/3580865.
Full textZhu, Lianghong, Huaikun Xiang, and Kai Zhang. "A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks." Symmetry 14, no. 1 (December 30, 2021): 46. http://dx.doi.org/10.3390/sym14010046.
Full textKorona, Mateusz, Radosław Giermakowski, Mateusz Biernacki, and Mariusz Rawski. "Lightweight Strong PUF for Resource-Constrained Devices." Electronics 13, no. 2 (January 14, 2024): 351. http://dx.doi.org/10.3390/electronics13020351.
Full textAsif, Rameez, Kinan Ghanem, and James Irvine. "Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy." Sensors 21, no. 1 (December 23, 2020): 28. http://dx.doi.org/10.3390/s21010028.
Full textChen, Xue Dong, and Bao Peng. "A Security Localization Method in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.186.193.
Full textBernard, Florent, Viktor Fischer, and Boyan Valtchanov. "Mathematical model of physical RNGs based on coherent sampling." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 1–14. http://dx.doi.org/10.2478/v10127-010-0001-1.
Full textHardin, David. "Hardware/Software Co-Assurance for the Rust Programming Language Applied to Zero Trust Architecture Development." ACM SIGAda Ada Letters 42, no. 2 (April 5, 2023): 55–61. http://dx.doi.org/10.1145/3591335.3591340.
Full textNoseda, Mario, Lea Zimmerli, Tobias Schläpfer, and Andreas Rüst. "Performance Analysis of Secure Elements for IoT." IoT 3, no. 1 (December 21, 2021): 1–28. http://dx.doi.org/10.3390/iot3010001.
Full textScholz, Alexander, Lukas Zimmermann, Axel Sikora, Mehdi B. Tahoori, and Jasmin Aghassi-Hagmann. "Embedded Analog Physical Unclonable Function System to Extract Reliable and Unique Security Keys." Applied Sciences 10, no. 3 (January 21, 2020): 759. http://dx.doi.org/10.3390/app10030759.
Full textUpadhyaya, Devanshi, Maël Gay, and Ilia Polian. "Locking-Enabled Security Analysis of Cryptographic Circuits." Cryptography 8, no. 1 (January 5, 2024): 2. http://dx.doi.org/10.3390/cryptography8010002.
Full textSerrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, and Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3." Cryptography 6, no. 2 (June 17, 2022): 30. http://dx.doi.org/10.3390/cryptography6020030.
Full textMadushan, Hasindu, Iftekhar Salam, and Janaka Alawatugoda. "A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses." Electronics 11, no. 24 (December 15, 2022): 4199. http://dx.doi.org/10.3390/electronics11244199.
Full textMaolood, Abeer Tariq, Alaa Kadhim Farhan, Wageda I. El-Sobky, Hany Nasry Zaky, Hossam L. Zayed, Hossam E. Ahmed, and Tamer O. Diab. "Fast Novel Efficient S-Boxes with Expanded DNA Codes." Security and Communication Networks 2023 (April 18, 2023): 1–19. http://dx.doi.org/10.1155/2023/5767102.
Full textMartin, Honorio, Pedro Martin-Holgado, Yolanda Morilla, Luis Entrena, and Enrique San-Millan. "Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs." Electronics 7, no. 9 (August 24, 2018): 163. http://dx.doi.org/10.3390/electronics7090163.
Full textChattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, and Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability." ACM Transactions on Design Automation of Electronic Systems 26, no. 6 (November 30, 2021): 1–24. http://dx.doi.org/10.1145/3460004.
Full textAlkanhal, Mona, Abdulaziz Alali, and Mohamed Younis. "A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV." IoT 5, no. 1 (December 30, 2023): 1–19. http://dx.doi.org/10.3390/iot5010001.
Full textZhou, Zhen, Debiao He, Zhe Liu, Min Luo, and Kim-Kwang Raymond Choo. "A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme." ACM Transactions on Reconfigurable Technology and Systems 14, no. 2 (June 5, 2021): 1–21. http://dx.doi.org/10.1145/3447812.
Full textIbrahim, Atef, and Fayez Gebali. "Energy-Efficient Word-Serial Processor for Field Multiplication and Squaring Suitable for Lightweight Authentication Schemes in RFID-Based IoT Applications." Applied Sciences 11, no. 15 (July 28, 2021): 6938. http://dx.doi.org/10.3390/app11156938.
Full textRojas-Muñoz, Luis F., Santiago Sánchez-Solano, Macarena C. Martínez-Rodríguez, and Piedad Brox. "On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices." Sensors 23, no. 8 (April 18, 2023): 4070. http://dx.doi.org/10.3390/s23084070.
Full textKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Full textEllinidou, Soultana, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, and Jean-Michel Dricot. "SSPSoC: A Secure SDN-Based Protocol over MPSoC." Security and Communication Networks 2019 (March 18, 2019): 1–11. http://dx.doi.org/10.1155/2019/4869167.
Full textFrank, Florian, Simon Böttger, Nico Mexis, Nikolaos Athanasios Anagnostopoulos, Ali Mohamed, Martin Hartmann, Harald Kuhn, et al. "CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based Physical Unclonable Functions." Nanomaterials 13, no. 22 (November 11, 2023): 2930. http://dx.doi.org/10.3390/nano13222930.
Full textSánchez-Solano, Santiago, Eros Camacho-Ruiz, Macarena C. Martínez-Rodríguez, and Piedad Brox. "Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems." Sensors 22, no. 5 (March 7, 2022): 2057. http://dx.doi.org/10.3390/s22052057.
Full textI Mhaibes, Hakeem, and Shahnawaz Qadir. "A Lightweight Authentication Framework for Wireless Sensor Networks." International journal of electrical and computer engineering systems 13, no. 13 (February 3, 2022): 19–27. http://dx.doi.org/10.32985/ijeces.13.1.3.
Full textRao, Muzaffar, Thomas Newe, Ian Grout, and Avijit Mathur. "High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650069. http://dx.doi.org/10.1142/s0218126616500699.
Full textKurra, Anil Kumar, and Usha Rani Nelakuditi. "A Reliable Current Starved Inverter based Arbiter Puf Architecture for Iot Applications." International Journal of Engineering and Advanced Technology 9, no. 1s5 (December 30, 2019): 163–67. http://dx.doi.org/10.35940/ijeat.a1038.1291s519.
Full textFalas, Solon, Charalambos Konstantinou, and Maria K. Michael. "A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (January 31, 2022): 1–19. http://dx.doi.org/10.1145/3460234.
Full textUeno, Rei, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (December 4, 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Full textBanerjee, Soumya, Ashok Kumar Das, Samiran Chattopadhyay, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues, and Youngho Park. "Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment." Electronics 10, no. 12 (June 12, 2021): 1417. http://dx.doi.org/10.3390/electronics10121417.
Full textIbrahim, Atef, and Fayez Gebali. "Word-Based Systolic Processor for Field Multiplication and Squaring Suitable for Cryptographic Processors in Resource-Constrained IoT Systems." Electronics 10, no. 15 (July 25, 2021): 1777. http://dx.doi.org/10.3390/electronics10151777.
Full text