-
1
-
-
3242756924
-
Embedded system security
-
Koopman P. Embedded system security. IEEE Comp. 37 7 (2004) 95-97
-
(2004)
IEEE Comp.
, vol.37
, Issue.7
, pp. 95-97
-
-
Koopman, P.1
-
2
-
-
47749138473
-
-
R. Anderson, Protecting embedded systems - the next ten years, in: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, CHES, vol. 2162 of LNCS, Paris, Springer, 2001.
-
R. Anderson, Protecting embedded systems - the next ten years, in: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, CHES, vol. 2162 of LNCS, Paris, Springer, 2001.
-
-
-
-
3
-
-
4444331720
-
-
S. Ravi, P. Kocher, R.B. Lee, G. McGraw, A. Raghunathan, Security as a new dimension in embedded system design, DAC 2004, pp. 753-760.
-
S. Ravi, P. Kocher, R.B. Lee, G. McGraw, A. Raghunathan, Security as a new dimension in embedded system design, DAC 2004, pp. 753-760.
-
-
-
-
4
-
-
52949121509
-
-
ARM, AMBA Specification (Rev 2.0). .
-
ARM, AMBA Specification (Rev 2.0). .
-
-
-
-
5
-
-
52949134925
-
-
IBM, CoreConnect Bus Architecture. .
-
IBM, CoreConnect Bus Architecture. .
-
-
-
-
6
-
-
52949086163
-
-
Opencores, WISHBONE Bus (Rev B.3). .
-
Opencores, WISHBONE Bus (Rev B.3). .
-
-
-
-
8
-
-
52949140675
-
-
R.J. Anderson, M.G. Kuhn, Low cost attacks on tamper resistant devices, in: M. Lomas et al. (Eds.), Security Protocols, Proceedings of the Fifth International Workshop, Paris, France, April 7-9, LNCS 1361, Springer, 1997, pp. 125-136.
-
R.J. Anderson, M.G. Kuhn, Low cost attacks on tamper resistant devices, in: M. Lomas et al. (Eds.), Security Protocols, Proceedings of the Fifth International Workshop, Paris, France, April 7-9, LNCS 1361, Springer, 1997, pp. 125-136.
-
-
-
-
9
-
-
0032180824
-
Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
-
Kuhn M.G. Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP. IEEE Trans. Comput. 47 10 (1998) 1153-1157
-
(1998)
IEEE Trans. Comput.
, vol.47
, Issue.10
, pp. 1153-1157
-
-
Kuhn, M.G.1
-
10
-
-
33745897337
-
-
J. Grand, Research lessons from hardware hacking, Commun. ACM 49 (6) (2006) 44-49.
-
J. Grand, Research lessons from hardware hacking, Commun. ACM 49 (6) (2006) 44-49.
-
-
-
-
11
-
-
52949150514
-
-
R.M. Best, Crypto microprocessor that executes enciphered programs, US Patent 4,465,901 (1984).
-
R.M. Best, Crypto microprocessor that executes enciphered programs, US Patent 4,465,901 (1984).
-
-
-
-
12
-
-
52949130342
-
-
R. Takahashi, D.N. Heer, Secure memory management unit for microprocessor, US Patent 5,825,878 (1998).
-
R. Takahashi, D.N. Heer, Secure memory management unit for microprocessor, US Patent 5,825,878 (1998).
-
-
-
-
13
-
-
52949112358
-
-
B. Candelore, E. Sprunk, Secure processor with external memory using block chaining and block reordering, US Patent 6,061,449 (2000).
-
B. Candelore, E. Sprunk, Secure processor with external memory using block chaining and block reordering, US Patent 6,061,449 (2000).
-
-
-
-
14
-
-
84889019266
-
-
T. Gilmont, J.-D. Legat, J.-J. Quisquater, Enhancing the security in the memory management unit, in: Proceedings of the 25th EuroMicro Conference, 1999, pp. 449-456.
-
T. Gilmont, J.-D. Legat, J.-J. Quisquater, Enhancing the security in the memory management unit, in: Proceedings of the 25th EuroMicro Conference, 1999, pp. 449-456.
-
-
-
-
15
-
-
1142280988
-
-
G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, S. Devadas, The AEGIS processor architecture for tamper-evident and tamper-resistant processing, in: Proceedings of the 17th International Conference on Supercomputing (ICS'03), June 23-26, 2003.
-
G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, S. Devadas, The AEGIS processor architecture for tamper-evident and tamper-resistant processing, in: Proceedings of the 17th International Conference on Supercomputing (ICS'03), June 23-26, 2003.
-
-
-
-
16
-
-
33646909103
-
-
R. Elbaz, L. Torres, G. Sassatelli, P. Guillemin, C. Anguille, M. Bardouillet, C. Buatois, J. B, Rigaud, Hardware engines for bus encryption: a survey of existing techniques, in: Proceedings of the Design Automation and Test in Europe (Date'05), 2005, pp. 40-45.
-
R. Elbaz, L. Torres, G. Sassatelli, P. Guillemin, C. Anguille, M. Bardouillet, C. Buatois, J. B, Rigaud, Hardware engines for bus encryption: a survey of existing techniques, in: Proceedings of the Design Automation and Test in Europe (Date'05), 2005, pp. 40-45.
-
-
-
-
17
-
-
52949124152
-
-
Dallas Semiconductor (Maxim), DS5002/DS5240 Datasheet. .
-
Dallas Semiconductor (Maxim), DS5002/DS5240 Datasheet. .
-
-
-
-
18
-
-
52949140300
-
-
ATMEL, AT91SAM7XC256 Preliminary Summary. .
-
ATMEL, AT91SAM7XC256 Preliminary Summary. .
-
-
-
-
19
-
-
17644426326
-
Tree Parity Machine Rekeying Architectures
-
Volkmer M., and Wallner S. Tree Parity Machine Rekeying Architectures. IEEE Trans. Comput. 54 4 (2005) 421-427
-
(2005)
IEEE Trans. Comput.
, vol.54
, Issue.4
, pp. 421-427
-
-
Volkmer, M.1
Wallner, S.2
-
20
-
-
33749060160
-
-
M. Volkmer, S. Wallner, A key establishment IP-core for ubiquitous computing, in: Proceedings of the First International Workshop on Secure and Ubiquitous Networks, SUN'05, Copenhagen Business School, Copenhagen, Denmark, IEEE Computer Society, 2005, pp. 241-245.
-
M. Volkmer, S. Wallner, A key establishment IP-core for ubiquitous computing, in: Proceedings of the First International Workshop on Secure and Ubiquitous Networks, SUN'05, Copenhagen Business School, Copenhagen, Denmark, IEEE Computer Society, 2005, pp. 241-245.
-
-
-
-
21
-
-
52949095842
-
-
M. Volkmer, S. Wallner, Lightweight key exchange and stream cipher based solely on Tree Parity Machines, ECRYPT (European Network of Excellence for Cryptology), in: Workshop on RFID and Lightweight Crypto, Graz University of Technology, Graz, Austria, 2005, pp. 102-113.
-
M. Volkmer, S. Wallner, Lightweight key exchange and stream cipher based solely on Tree Parity Machines, ECRYPT (European Network of Excellence for Cryptology), in: Workshop on RFID and Lightweight Crypto, Graz University of Technology, Graz, Austria, 2005, pp. 102-113.
-
-
-
-
22
-
-
0036340335
-
Secure exchange of information by synchronization of neural networks
-
Kanter I., Kinzel W., and Kanter E. Secure exchange of information by synchronization of neural networks. Europhys. Lett. 57 1 (2002) 141-147
-
(2002)
Europhys. Lett.
, vol.57
, Issue.1
, pp. 141-147
-
-
Kanter, I.1
Kinzel, W.2
Kanter, E.3
-
23
-
-
0018456171
-
Universal classes of hash functions
-
Carter J.L., and Wegman M. Universal classes of hash functions. J. Comput. Syst. Sci. 18 (1977) 143-154
-
(1977)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.2
-
24
-
-
30344451674
-
Energy scalable universal hashing
-
Kaps J.P., Yksel K., and Sunar B. Energy scalable universal hashing. IEEE Trans. Comput. 54 12 (2005) 1484-1495
-
(2005)
IEEE Trans. Comput.
, vol.54
, Issue.12
, pp. 1484-1495
-
-
Kaps, J.P.1
Yksel, K.2
Sunar, B.3
-
25
-
-
52949127430
-
-
B. Saballus, S. Wallner, M. Volkmer, Secure group communication in ad-hoc networks using Tree Parity Machines, in: Proceedings of the Fourth Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
-
B. Saballus, S. Wallner, M. Volkmer, Secure group communication in ad-hoc networks using Tree Parity Machines, in: Proceedings of the Fourth Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
-
-
-
-
26
-
-
52949113540
-
-
L. Batina, J. Lano, N. Mentens, S.B. Ors, B. Preneel, I. Ver-bauwhede, Energy, performance, area versus security trade-offs for stream ciphers, Katholieke Universiteit Leuven, 2005.
-
L. Batina, J. Lano, N. Mentens, S.B. Ors, B. Preneel, I. Ver-bauwhede, Energy, performance, area versus security trade-offs for stream ciphers, Katholieke Universiteit Leuven, 2005.
-
-
-
-
27
-
-
52949099605
-
-
CAST Inc., AES Core. .
-
CAST Inc., AES Core. .
-
-
-
-
28
-
-
52949144310
-
-
T. Good, W. Chelton, M. Benaissa, Review of stream cipher candidates from a low resource hardware perspective, University of Sheffield.
-
T. Good, W. Chelton, M. Benaissa, Review of stream cipher candidates from a low resource hardware perspective, University of Sheffield.
-
-
-
-
29
-
-
52949091634
-
-
European Network of Excellence for Cryptology, ESTREAM Project. .
-
European Network of Excellence for Cryptology, ESTREAM Project. .
-
-
-
-
30
-
-
52949103039
-
-
PortalPlayer Inc., PP5022 Datasheet. .
-
PortalPlayer Inc., PP5022 Datasheet. .
-
-
-
-
32
-
-
0017930809
-
-
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM (1978).
-
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM (1978).
-
-
-
-
33
-
-
0034238005
-
Interacting neural networks
-
Metzler R., Kinzel W., and Kanter I. Interacting neural networks. Phys. Rev. E 62 2 (2000) 2555-2565
-
(2000)
Phys. Rev. E
, vol.62
, Issue.2
, pp. 2555-2565
-
-
Metzler, R.1
Kinzel, W.2
Kanter, I.3
-
34
-
-
0142021471
-
Interacting neural networks and cryptography
-
Kramer B. (Ed), Springer
-
Kinzel W., and Kanter I. Interacting neural networks and cryptography. In: Kramer B. (Ed). Advances in Solid State Physics vol. 42 (2002), Springer
-
(2002)
Advances in Solid State Physics
, vol.42
-
-
Kinzel, W.1
Kanter, I.2
-
37
-
-
41349083924
-
Secure key-exchange protocol with an absence of injective functions
-
Mislovaty R., Perchenok Y., Kanter I., and Kinzel W. Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E 66 (2002) 066102
-
(2002)
Phys. Rev. E
, vol.66
, pp. 066102
-
-
Mislovaty, R.1
Perchenok, Y.2
Kanter, I.3
Kinzel, W.4
-
38
-
-
52949086912
-
-
T. Alves, D. Felton, TrustZone: Integrated Hardware and Software Security, White Paper, ARM. .
-
T. Alves, D. Felton, TrustZone: Integrated Hardware and Software Security, White Paper, ARM. .
-
-
-
|