264 papers found
Refreshing results…
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers
A PUF-Based Secure Communication Protocol for IoT
Security of Crypto IP Core: Issues and Countermeasures
Construction of Rotation Symmetric S-Boxes with High Nonlinearity and Improved DPA Resistivity
Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers
Using Tweaks To Design Fault Resistant Ciphers (Full Version)
Lightweight Design Choices for LED-like Block Ciphers
Testing of Side-Channel Leakage of Cryptographic Intellectual Properties: Metrics and Evaluations
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
Accelerating OpenSSL's ECC with low cost reconfigurable hardware
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC
Secure public key hardware for IoT applications
Shuffling across rounds: A lightweight strategy to counter side-channel attacks
Template attack on SPA and FA resistant implementation of Montgomery ladder
Testability Based Metric for Hardware Trojan Vulnerability Assessment
Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications
Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGA
Power Consumption versus Hardware Security: Feasibility Study of Differential Power Attack on Linear Feedback Shift Register Based Stream Ciphers and Its Countermeasures
Missing publications? Read more about our data sources.