Sciweavers

2945 search results - page 23 / 589
» Designing and Implementing Malicious Hardware
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 10 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
DAC
2000
ACM
15 years 8 months ago
System design of active basestations based on dynamically reconfigurable hardware
– This paper describes the system design and implementation of Active Basestations, a novel application of the run-time reconfigurable hardware technology whose applications have...
Athanassios Boulis, Mani B. Srivastava
HVC
2007
Springer
103views Hardware» more  HVC 2007»
15 years 10 months ago
Verifying Parametrised Hardware Designs Via Counter Automata
The paper presents a new approach to formal verification of generic (i.e. parametrised) hardware designs specified in VHDL. The proposed approach is based on a translation of suc...
Ales Smrcka, Tomás Vojnar
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 9 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
IPPS
1998
IEEE
15 years 8 months ago
A Hardware/Software Co-Design System Using Configurable Computing Technology
Virtual Computer Corporation has combined the latest reconfigurable component technology with a number of advanced software tools in one easy to use `system approach' to digi...
John Schwel