-
3
-
-
31344435929
-
Cryptographic processors - a survey
-
Feb
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov. Cryptographic processors - a survey. Proceedings of the IEEE, 94(2):357-369, Feb 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
4
-
-
50149095370
-
How to Protect Intellectual Property in FPGA Devices Part II
-
T. Barraza. How to Protect Intellectual Property in FPGA Devices Part II. Design and Reuse Online: Industry Articles, 2005. http://www.us.design- reuse.com/articles/article11240.html
-
(2005)
Design and Reuse Online: Industry Articles
-
-
Barraza, T.1
-
5
-
-
50149085052
-
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm.
-
-
-
-
6
-
-
50149092596
-
-
Berkeley University
-
Berkeley University. Bee2 project. http://bee2.eecs.berkeley.edu
-
Bee2 project
-
-
-
7
-
-
84886597473
-
Dynamically configurable security for SRAM FPGA bitstreams
-
L. Bossuet, G. Gogniat, and W. Burleson. Dynamically configurable security for SRAM FPGA bitstreams. International Journal of Embedded Systems, 2(1-2):73-85, 2006.
-
(2006)
International Journal of Embedded Systems
, vol.2
, Issue.1-2
, pp. 73-85
-
-
Bossuet, L.1
Gogniat, G.2
Burleson, W.3
-
8
-
-
85057426796
-
-
CRC Press
-
H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, and F Vercauteren. Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, 2006.
-
(2006)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
Cohen, H.1
Frey, G.2
Avanzi, R.3
Doche, C.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
10
-
-
50149100116
-
-
J. Fry and M. Langhammer. RSA & Public Key Cryptography in FPGAs. Technical report, Altera Corp., 2005.
-
J. Fry and M. Langhammer. RSA & Public Key Cryptography in FPGAs. Technical report, Altera Corp., 2005.
-
-
-
-
11
-
-
50149111516
-
-
T. Kean. Secure configuration of field programmable gate arrays. In In proceeding of 11th International Conference on Field-Programmable Logic and Applications, FPL2001, Belfast, United Kingdom, 2001.
-
T. Kean. Secure configuration of field programmable gate arrays. In In proceeding of 11th International Conference on Field-Programmable Logic and Applications, FPL2001, Belfast, United Kingdom, 2001.
-
-
-
-
13
-
-
47349110012
-
Cryptographic Rights Management of FPGA Intellectual Property Cores
-
Monterey, CA
-
T. Kean. Cryptographic Rights Management of FPGA Intellectual Property Cores. In Proceedings ACM Conference on FPGAs, Monterey, CA, 2002.
-
(2002)
Proceedings ACM Conference on FPGAs
-
-
Kean, T.1
-
14
-
-
50149102113
-
-
Ç. K. Koç. RSA hardware implementation. Technical report TR801, RSA Data Security, Inc., Aug. 1995.
-
Ç. K. Koç. RSA hardware implementation. Technical report TR801, RSA Data Security, Inc., Aug. 1995.
-
-
-
-
15
-
-
2442532948
-
An embedded true random number generator for FPGAs
-
R. Tessier and H. Schmit, ed, ACM
-
P. Kohlbrenner and K. Gaj. An embedded true random number generator for FPGAs. In R. Tessier and H. Schmit, ed., FPGA, pp. 71-78. ACM, 2004.
-
(2004)
FPGA
, pp. 71-78
-
-
Kohlbrenner, P.1
Gaj, K.2
-
18
-
-
84893758523
-
FPGA-based implementation of a serial RSA processor
-
A. Mazzeo, L. Romano, G. PaoloSaggese, and N. Mazzocca. FPGA-based implementation of a serial RSA processor. Design, Automation and Test in Europe Conference and Exposition, pp. 10582-10589, 2003.
-
(2003)
Design, Automation and Test in Europe Conference and Exposition
, pp. 10582-10589
-
-
Mazzeo, A.1
Romano, L.2
PaoloSaggese, G.3
Mazzocca, N.4
-
19
-
-
0012983374
-
Recommendation for block cipher modes of operation - the CMAC mode for authentication
-
National Institute of Standards and Technology NIST
-
National Institute of Standards and Technology (NIST). Recommendation for block cipher modes of operation - the CMAC mode for authentication. NIST Special Publication SP 800-38B, 2005.
-
(2005)
NIST Special Publication
, vol.SP 800-38B
-
-
-
20
-
-
47349083762
-
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
-
National Institute of Standards and Technology NIST
-
National Institute of Standards and Technology (NIST). Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. NIST Special Publication SP 800-56A, 2006.
-
(2006)
NIST Special Publication
, vol.SP 800-56A
-
-
-
21
-
-
35248847436
-
Power-analysis attacks on an FPGA first experimental results
-
CHES
-
S. B. Örs, E. Oswald, and B. Preneel. Power-analysis attacks on an FPGA first experimental results. In CHES 2003, LNCS vol. 2779, pp. 35-50, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 35-50
-
-
Örs, S.B.1
Oswald, E.2
Preneel, B.3
-
22
-
-
33750702480
-
Offline hardware/software authentication for reconfigurable platforms
-
CHES 2006
-
E. Simpson and P. Schaumont. Offline hardware/software authentication for reconfigurable platforms. In CHES 2006, LNCS vol. 4249, pp. 311-323, 2006.
-
(2006)
LNCS
, vol.4249
, pp. 311-323
-
-
Simpson, E.1
Schaumont, P.2
-
23
-
-
85008060937
-
-
B. Sunar, W. J. Martin, and D. R. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Tr. Computers, 56.1:109-119, January 2007.
-
B. Sunar, W. J. Martin, and D. R. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Tr. Computers, 56.1:109-119, January 2007.
-
-
-
|