Sciweavers

49 search results - page 7 / 10
» Low Cost Attacks on Tamper Resistant Devices
Sort
View
ICRA
2003
IEEE
146views Robotics» more  ICRA 2003»
14 years 19 days ago
Bundled carbon nanotubes as electronic circuit and sensing elements
- Bundled multi-walled carbon nanotubes (MWNT) were successfully and repeatably manipulated by AC electrophoresis to form resistive elements between Au microelectrodes and were dem...
Victor T. S. Wong, Wen J. Li
TMC
2012
11 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 8 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
SISW
2003
IEEE
14 years 19 days ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
ISCAS
2007
IEEE
129views Hardware» more  ISCAS 2007»
14 years 1 months ago
ECC Processor with Low Die Size for RFID Applications
Abstract— This paper presents the design of a special purpose processor with Elliptic Curve Digital Signature Algorithm (ECDSA) functionality. This digital signature generation d...
Franz Fürbass, Johannes Wolkerstorfer