Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Introduction to hardware security
Y ** - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …
related research domains joining this area. However, the understanding of hardware …
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …
due to the increasing demand for secure transmission of confidential information. Although …
Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …
separation. It has been quite successful in defending against various software attacks and …
VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults
Intel software-guard extensions (SGX) allows applications to run in a trusted space
(enclave), which provides a highly secure primitive for the running codes and data. Most …
(enclave), which provides a highly secure primitive for the running codes and data. Most …
Emerging technology-based design of primitives for hardware security
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans
have triggered research into circuit protection and malicious logic detection from various …
have triggered research into circuit protection and malicious logic detection from various …
Fault injection using crowbars on embedded systems
C O'Flynn - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Causing a device to incorrectly execute an instruction or store faulty data is well-known
strategy for attacking cryptographic implementations on embedded systems. One technique …
strategy for attacking cryptographic implementations on embedded systems. One technique …
Leveraging emerging technology for hardware security-case study on silicon nanowire fets and graphene symfets
Hardware security concerns such as IP piracy and hardware Trojans have triggered
research into circuit protection and malicious logic detection from various design …
research into circuit protection and malicious logic detection from various design …
Voltjockey: A new dynamic voltage scaling-based fault injection attack on intel sgx
Intel software guard extensions (SGX) increase the security of applications by enabling them
to be performed in a highly trusted space (called enclave). Most state-of-the-art attacks on …
to be performed in a highly trusted space (called enclave). Most state-of-the-art attacks on …
Key Generation using Curve Fitting for Polynomial based Cryptography
Every organization's primary concern is security. A cryptography method will remain safe in
the system if the key is not cracked by a hacker through any kind of attacks. A conventional …
the system if the key is not cracked by a hacker through any kind of attacks. A conventional …
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
Code-based public-key cryptosystems are promising candidates for standardization as
quantum-resistant public-key cryptographic algorithms. Their security is based on the …
quantum-resistant public-key cryptographic algorithms. Their security is based on the …