[HTML][HTML] A review on security implementations in soft-processors for IoT applications

MA Caraveo-Cacep, R Vázquez-Medina… - Computers & Security, 2024 - Elsevier
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …

An area-time efficient point-multiplication architecture for ECC over GF (2m) using polynomial basis

PKG Nadikuda, L Boppana - Microprocessors and Microsystems, 2022 - Elsevier
The modern age has seen an enormous progress in communications. Millions of devices
communicate over the web transmitting confidential information which sometimes is of …

Hardware Design and Verification with Large Language Models: A Sco** Review, Challenges, and Open Issues

M Abdollahi, SF Yeganli, MA Baharloo… - Electronics, 2025 - search.proquest.com
Background: Large Language Models (LLMs) are emerging as promising tools in hardware
design and verification, with recent advancements suggesting they could fundamentally …

Exploration of the Role of Cryptoprocessors in Advancing IoT Security

E Kakoulli, E Zacharioudakis - 2024 20th International …, 2024 - ieeexplore.ieee.org
This paper presents a thorough exploration of Cryptoprocessors in the context of the Internet
of Things (IoT). The focus is on hardware support, cryptographic processors, and energy …

Accelerating operations on permutations using graphics processing units

A Lavdanskyi, E Faure, A Skutskyi, C Bazilo - … " Information Technology for …, 2022 - Springer
GPUs (graphics processing units) are used in many modern computer systems. They consist
of a large number of low-performance computing units that can be used for operations in …

[PDF][PDF] Hardware Design and Verification with Large Language Models: A Literature Survey, Challenges, and Open Issues

M Abdollahi, SF Yeganli, MA Baharloo, A Baniasadi - 2024 - preprints.org
Large Language Models (LLMs) are emerging as promising tools in hardware design and
verification, with recent advancements suggesting they could fundamentally reshape …

High speed elliptic curve cryptography architecture for NIST recommended Galois field

K Patel, M Shah, P Prajapati - International Journal of …, 2022 - search.proquest.com
There is an explosive growth of confidential data transmission over the internet with
resource-constrained applications. Real time applications require a high-speed and area …

[PDF][PDF] Design and Implementation of Efficient Elliptic Curve Cryptography on Reconfigurable Platforms

PK Vishnubhai, MV Shah - gtusitecirculars.s3.amazonaws.com
I declare that the thesis entitled Design and Implementation of Efficient Elliptic Curve
Cryptography on Reconfigurable Platforms submitted by me for the degree of Doctor of …

[PDF][PDF] Design and Implementation of Efficient Elliptic Curve Cryptography on Reconfigurable Platforms

KV Patel - gtusitecirculars.s3.amazonaws.com
A brief description on the state of the art research topic 2 2.1 Motivation 2 2.2 Literature
review 3 3. Definition of the problem 5 4. Objective and scope of work 5 4.1. Objectives of the …