Sciweavers

1210 search results - page 61 / 242
» Secure Logic Synthesis
Sort
View
DATE
2004
IEEE
149views Hardware» more  DATE 2004»
14 years 1 months ago
A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation
This paper describes a novel design methodology to implement a secure DPA resistant crypto processor. The methodology is suitable for integration in a common automated standard ce...
Kris Tiri, Ingrid Verbauwhede
ISICT
2003
13 years 11 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
EDCC
2010
Springer
14 years 2 months ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight