Results 1 - 10
of
283
IPSEC IMPLEMENTATION IN EMBEDDED SYSTEMS FOR PARTIAL RECONFIGURABLE PLATFORMS
"... I dedicate this thesis to my parents, Ali Salman and Fatma Mahmoud, my sisters Mona, Hadeel and Inas, my brother Akram for believing in me and for their endless support. iii Acknowledgments First I wish to thank my advisor Dr. Jens-Peter Kaps for his guidance, support and endless patience during the ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
to the right direction and providing a starting point for the thesis as well as valuable resources. I’d also like to thank Dr. Craig Lorie for the time he provided, valuable comments and for understanding when I did not fulfill my duties as his TA on time during my thesis work. Finally, a special thanks to my
CRYPTOGRAPHY AND CRYPTANALYSIS ON RECONFIGURABLE DEVICES Security Implementations for Hardware and
"... Printed in Germany. This thesis is dedicated to Sindy for her love and support throughout the course of this thesis. In loving memory of my parents. Author’s contact information: ..."
Abstract
- Add to MetaCart
Printed in Germany. This thesis is dedicated to Sindy for her love and support throughout the course of this thesis. In loving memory of my parents. Author’s contact information:
What security properties can my mobile platform give me?
, 2011
"... We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-holders in today’s mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. We systema ..."
Abstract
- Add to MetaCart
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-holders in today’s mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. We
Security for a High Performance Commodity Storage Subsystem
, 1999
"... and the United States Postal Service. The views and conclusions in this document are my own and should not be interpreted as representing the official policies, either expressed or implied, of any supporting organization or the U.S. Government. ..."
Abstract
-
Cited by 45 (1 self)
- Add to MetaCart
and the United States Postal Service. The views and conclusions in this document are my own and should not be interpreted as representing the official policies, either expressed or implied, of any supporting organization or the U.S. Government.
unknown title
, 2008
"... A reconfigurable and interoperable hardware architecture for elliptic curve cryptography ..."
Abstract
- Add to MetaCart
A reconfigurable and interoperable hardware architecture for elliptic curve cryptography
Lightweight Cryptography: Cryptographic Engineering for a Pervasive World
- PH.D. THESIS
, 2009
"... Increasingly, everyday items are enhanced to pervasive devices by embedding computing power and their interconnection leads to Mark Weiser's famous vision of ubiquitous computing (ubicomp), which is widely believed to be the next paradigm in information technology.
The mass deployment of pervas ..."
Abstract
-
Cited by 23 (3 self)
- Add to MetaCart
algorithm, called PRESENT, where we could build upon the results of the first step. A variety
of implementation results of PRESENT---both in software and hardware---using different
design strategies and different platforms is presented. Our serialized ASIC implementation
(1,000 GE) is the smallest published
Security for volatile FPGAs
, 2009
"... With reconfigurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on “FPGA sec-urity ” has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique ..."
Abstract
-
Cited by 13 (0 self)
- Add to MetaCart
With reconfigurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on “FPGA sec-urity ” has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique
SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust
- IN: PROCEEDINGS OF THE 19TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM
"... Remote attestation is the process of securely verifying internal state of a remote hardware platform. It can be achieved either statically (at boot time) or dynamically, at run-time in order to establish a dynamic root of trust. The latter allows full isolation of a code region from preexisting soft ..."
Abstract
-
Cited by 13 (6 self)
- Add to MetaCart
Remote attestation is the process of securely verifying internal state of a remote hardware platform. It can be achieved either statically (at boot time) or dynamically, at run-time in order to establish a dynamic root of trust. The latter allows full isolation of a code region from preexisting
CRYPTONITE -- A Programmable Crypto Processor Architecture for . . .
, 2002
"... Cryptography was and still is one of the most interesting fields in Computer Science-related research. Where its origin lies in military and governmental use, today cryptography is widely used in everyday life. Cryptography secures communication between smart cards and card readers. It scrambles tra ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
transmissions between DECT telephones and their base stations, it even entered the living rooms through digital Pay TV channels which use cryptographic methods to make sure that only their subscribers can watch their transmissions – and only what they have payed for. Similarly, each DVD player contains
Results 1 - 10
of
283