top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Deep learning for computational problems in hardware security : modeling attacks on strong physically unclonable function circuits / / Pranesh Santikellur, Rajat Subhra Chakraborty
Deep learning for computational problems in hardware security : modeling attacks on strong physically unclonable function circuits / / Pranesh Santikellur, Rajat Subhra Chakraborty
Autore Santikellur Pranesh
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (92 pages)
Disciplina 006.3
Collana Studies in computational intelligence
Soggetto topico Artificial intelligence
Computer science
ISBN 981-19-4017-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910627259803321
Santikellur Pranesh  
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Image Forensics [[electronic resource] ] : Theory and Implementation / / by Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty
Digital Image Forensics [[electronic resource] ] : Theory and Implementation / / by Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty
Autore Roy Aniket
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 89 p. 45 illus., 32 illus. in color.)
Disciplina 363.252
Collana Studies in Computational Intelligence
Soggetto topico Signal processing
Image processing
Speech processing systems
Optical data processing
Computer crimes
Signal, Image and Speech Processing
Image Processing and Computer Vision
Cybercrime
ISBN 981-10-7644-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work.
Record Nr. UNINA-9910366596103321
Roy Aniket  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
High Performance Integer Arithmetic Circuit Design on FPGA [[electronic resource] ] : Architecture, Implementation and Design Automation / / by Ayan Palchaudhuri, Rajat Subhra Chakraborty
High Performance Integer Arithmetic Circuit Design on FPGA [[electronic resource] ] : Architecture, Implementation and Design Automation / / by Ayan Palchaudhuri, Rajat Subhra Chakraborty
Autore Palchaudhuri Ayan
Edizione [1st ed. 2016.]
Pubbl/distr/stampa New Delhi : , : Springer India : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (125 p.)
Disciplina 621.395
Collana Springer Series in Advanced Microelectronics
Soggetto topico Electronic circuits
Electronics
Microelectronics
Logic design
Circuits and Systems
Electronics and Microelectronics, Instrumentation
Logic Design
ISBN 81-322-2520-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Architecture of Target FPGA Platform -- A Fabric Component based Design Approach for High Performance Integer Arithmetic Circuits -- Architecture of Data path Circuits -- Architecture of Control path Circuits -- Compact FPGA Implementation of Linear Cellular Automata -- Design Automation and Case Studies -- Conclusions and Future Work.
Record Nr. UNINA-9910254184203321
Palchaudhuri Ayan  
New Delhi : , : Springer India : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Fault Tolerance in Internet of Things / / edited by Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos
Security and Fault Tolerance in Internet of Things / / edited by Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (221 pages)
Disciplina 005.824
Collana Internet of Things, Technology, Communications and Computing
Soggetto topico Wireless communication systems
Mobile communication systems
Application software
Computer security
Wireless and Mobile Communication
Information Systems Applications (incl. Internet)
Systems and Data Security
ISBN 3-030-02807-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Trust Verification of IoT SoCs -- Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework -- Secure multicast communication techniques for IoT -- An Adaptable System-on-Chip Security Architecture for Internet of Things Applications -- Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data -- An approach to integrating security and fault tolerance mechanisms into the military IoT -- Fault-tolerant Implementations of Physically Unclonable Functions on FPGA -- Fault Tolerance in 3D-ICs -- Formal Verification for Security in IoT Devices -- SENSE: Sketching framework for Big Data Acceleration on Low Power Embedded Cores.
Record Nr. UNINA-9910337649703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 373 p. 88 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-24126-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Message from the General Chairs -- SPACE 2015 -- Abstracts of Invited Talks -- Boring Crypto -- Introduction to Security Analysis of Crypto APIs -- The Tor Network: Free Software for a Free Society -- Post-Quantum Cryptography -- Inferring Programmer Expectations to Protect Program Execution -- Side Channel Attacks: Types, Methods and Countermeasures -- Contents -- Efficient Protocol for Authenticated Email Search -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Primitives and Complexity Assumptions -- 2.2 Authenticated Data Structure -- 2.3 System Overview -- 3 Proposed Protocol -- 3.1 Setup -- 3.2 Update -- 3.3 Intersection -- 3.4 Union -- 3.5 Composite Query -- 4 Comparison -- 4.1 Analytical Comparison -- 4.2 Experimental Results -- 5 Conclusion -- Analyzing Traffic Features of Common Standalone DoS Attack Tools -- 1 Introduction -- 2 Related Work -- 3 Experiment -- 3.1 DoS Tools Selection -- 3.2 Environment -- 3.3 Measurement -- 4 DoS Traffic Properties -- 4.1 Traffic Burst Behavior -- 4.2 Flow Count -- 4.3 Flow Parallelity -- 4.4 HTTP Requests Per Flow -- 4.5 HTTP Request URIs -- 4.6 Flow Packet Count -- 5 Discussion -- 5.1 Traffic Features and Aggregation -- 5.2 Repeating Patterns -- 5.3 Evasion Techniques -- 5.4 Future Work -- 6 Conclusions -- Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach -- Introduction -- Goals of Designing a Virtual SCADA Lab -- Virtual SCADA Testbed Design Methodology -- Distributed VSCADA Testbed System Architecture Design -- VSCADA Backend Architecture Design -- VSCADA Frontend Architecture Design -- Network Simulation/Emulation Architecture Design -- VSCADA Implementation -- Human Machine Interface (HMI) -- SCADA Master Control Server -- Communication Protocol -- Linux Containers/NS2 Interface -- Software Simulators.
Cyber Security Case Study -- Network Security Scenario -- Data Injection Attack Implementation -- Conclusion -- Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer -- 1 Introduction -- 2 Background -- 2.1 System Configuration -- 2.2 Trends in System Configuration -- 3 Attack Surfaces -- 4 Proposed Approach -- 5 Deploying the Approach -- 5.1 Hierarchical State Machine Model -- 5.2 Proposing Attack Surfaces -- 5.3 Finding Flow Errors -- 5.4 Mediating Flow Errors -- 5.5 Testing the Resulting System -- 6 Conclusions -- Improving Application Security through TLS-Library Redesign -- Introduction -- Related Work -- API Pitfalls -- Improved APIs and Static Analysis -- Privilege Separation -- Specialized Cryptographic Key Isolation -- Threat Model -- Design of libtlssep -- Libtlssep Architecture -- LibtlssepAPI and Configuration -- Security, Programmability, and Performance -- Security Benefits of libtlssep's API and Architecture -- Programmability -- Performance -- Conclusion -- How Not to Combine RC4 States -- 1 Introduction -- 1.1 Contribution and Organization of the Paper -- 2 Description and Analysis of the RC4B Stream Cipher -- 2.1 Description of RC4B -- 2.2 Analysis of RC4B -- 3 Description and Analysis of Quad-RC4 and m-RC4 Stream Ciphers -- 3.1 Description of Quad-RC4 -- 3.2 Analysis of Quad-RC4 -- 3.3 Description of m-RC4 -- 3.4 Analysis for Even m -- 3.5 Analysis for General m -- 3.6 The Flaws in the Design -- 4 Experimental Results -- 5 Conclusion -- Preimage Analysis of the Maelstrom-0 Hash Function -- 1 Introduction -- 2 Related Work -- 3 Specifications of Maelstrom-0 -- 4 Pseudo Preimage Attack on the 6-Round Reduced Compression Function -- 5 Preimage of the Maelstrom-0 Hash Function -- 6 Conclusion -- Meet-in-the-Middle Attacks on Round-Reduced Khudra -- 1 Introduction -- 2 Specifications of Khudra -- 2.1 Notations.
3 MitM Attacks on Round-Reduced Khudra -- 3.1 A MitM Attack on 13-Round Khudra -- 3.2 A MitM Attack on 14-Round Khudra -- 4 Conclusion and Discussion -- Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting -- 1 Introduction -- 2 Specification of Hierocrypt-L1 -- 3 A Differential Enumeration MitM Attack on HC-L1 -- 4 Conclusion -- S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels -- Introduction -- Known S-boxes with Good Properties -- The Case m Evaluating the Security of the Infective Countermeasure against DFA -- Security against Single Fault Injections -- Security against Multiple Fault Injection -- Instruction Skip Threats to the Infective Countermeasure -- Possible Attacks on the Infective Countermeasure: Affecting Flow Sequence -- The Instruction Skip Fault Model -- Instruction Skip Attack on the Infective Countermeasure -- The Information Leakage : A Formal Quantification -- The Loopholes in the Infective Countermeasure : A Closer Look -- A Modified Infective Countermeasure -- Instruction Skip Attack on the Modified Algorithm -- Simulation and Experimental Results -- Simulation Results -- Experimental Results -- Conclusions -- Security of the Bit String cstr in the Modified Countermeasure -- Modified Transparency Order Property: Solution or Just Another Attempt -- Introduction -- Related Work -- Our Contributions -- Preliminaries -- Optimal S-boxes -- Cryptographic Properties of S-boxes -- Affine Equivalence -- Generating S-boxes -- Random Search -- Genetic Algorithm -- Evolved S-boxes -- Affine Transformations -- Success Rate Evaluation of DPA Attacks on the Synthesized S-boxes -- Conclusion -- Investigating SRAM PUFsin large CPUs and GPUs -- 1 Introduction -- 2 Experimental Setup for the CPU -- 3 CPU Registers -- 3.1 Boot Process -- 3.2 Kernel -- 3.3 GRUB -- 3.4 Coreboot -- 4 CPU Cache -- 4.1 Cache Operation -- 4.2 Coreboot -- 5 GPU Experimental Setup -- 6 GPU Multiprocessor Shared Memory -- 7 Discussion -- 7.1 Future Work -- Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications -- Introduction -- Rationale of the RLUT -- Comparison with Dynamic Configuration -- RLUT and Security -- Destructive Applications of RLUT -- Adversary Model -- Trigger Design the Hardware Trojans -- Trojan Description -- Constructive Applications for RLUT -- Customizable Sboxes.
Sbox Scrambling for DPA Resistance -- Conclusions -- Trigger Generation for Hardware Trojans -- Architecture Considerations for Massively Parallel Hardware Security Platform -- Introduction -- Cryptography as a Service (CaaS) -- Levels of Trust and Security -- Usage Scenarios -- Typical Operations Needed for CaaS -- Preferred Properties of Cloud-Based High-Performance CaaS -- Building Hardware for CaaS Back-End -- Designing CaaS -- The Proposed Design -- Why Smart Cards? -- The Case Study: HMAC-Based One-Time Password -- Why Would HOTP Will Benefit from CaaS? -- Moving HOTP into CaaS -- HOTP Implementation -- Performance Results - A Single Card -- Improving Expected Performance -- Performance Results - Network of Processors -- Future Directions -- Conclusions -- Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers -- Introduction 2 pg -- Side-Channel Analysis on the AVR 1 pg -- Timing Analysis -- Simple Power Analysis -- Prime Field Arithmetic -- Arithmetic Modulo Ed25519 Group Order -- Scalar Multiplication -- Extended Twisted Edwards Coordinates -- Variable-Base Scalar Multiplication -- Flash Memory Address Leakage Through Power -- Fixed-Base ECSM for Ed25519 Key Generation and Signing -- Projective Coordinate Randomization -- Hashing and PRNG -- Elliptic Curve Protocols -- Benchmarking Results 1 pg -- Timing and Simple Power Analysis Leakage Evaluation -- Application of CRI's Methodology to ECC -- Measurement Setup and Capture of Power Traces -- SPA Leakage Analysis -- Side-Channel Analysis Results 1 pg -- Conclusion -- ATmega328P Microcontroller and Chipwhisperer -- Algorithms -- Towards Practical Attribute-Based Signatures -- 1 Introduction -- 2 About IRMA -- 3 IRMA's Selective Disclosure Proofs as Digital Signatures -- 3.1 IRMA Signature Scheme.
3.2 Diversification between SD Proofs Used for Authentication and Signatures.
Record Nr. UNISA-996466469103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
Security, Privacy, and Applied Cryptography Engineering : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 373 p. 88 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-24126-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Message from the General Chairs -- SPACE 2015 -- Abstracts of Invited Talks -- Boring Crypto -- Introduction to Security Analysis of Crypto APIs -- The Tor Network: Free Software for a Free Society -- Post-Quantum Cryptography -- Inferring Programmer Expectations to Protect Program Execution -- Side Channel Attacks: Types, Methods and Countermeasures -- Contents -- Efficient Protocol for Authenticated Email Search -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Primitives and Complexity Assumptions -- 2.2 Authenticated Data Structure -- 2.3 System Overview -- 3 Proposed Protocol -- 3.1 Setup -- 3.2 Update -- 3.3 Intersection -- 3.4 Union -- 3.5 Composite Query -- 4 Comparison -- 4.1 Analytical Comparison -- 4.2 Experimental Results -- 5 Conclusion -- Analyzing Traffic Features of Common Standalone DoS Attack Tools -- 1 Introduction -- 2 Related Work -- 3 Experiment -- 3.1 DoS Tools Selection -- 3.2 Environment -- 3.3 Measurement -- 4 DoS Traffic Properties -- 4.1 Traffic Burst Behavior -- 4.2 Flow Count -- 4.3 Flow Parallelity -- 4.4 HTTP Requests Per Flow -- 4.5 HTTP Request URIs -- 4.6 Flow Packet Count -- 5 Discussion -- 5.1 Traffic Features and Aggregation -- 5.2 Repeating Patterns -- 5.3 Evasion Techniques -- 5.4 Future Work -- 6 Conclusions -- Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach -- Introduction -- Goals of Designing a Virtual SCADA Lab -- Virtual SCADA Testbed Design Methodology -- Distributed VSCADA Testbed System Architecture Design -- VSCADA Backend Architecture Design -- VSCADA Frontend Architecture Design -- Network Simulation/Emulation Architecture Design -- VSCADA Implementation -- Human Machine Interface (HMI) -- SCADA Master Control Server -- Communication Protocol -- Linux Containers/NS2 Interface -- Software Simulators.
Cyber Security Case Study -- Network Security Scenario -- Data Injection Attack Implementation -- Conclusion -- Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer -- 1 Introduction -- 2 Background -- 2.1 System Configuration -- 2.2 Trends in System Configuration -- 3 Attack Surfaces -- 4 Proposed Approach -- 5 Deploying the Approach -- 5.1 Hierarchical State Machine Model -- 5.2 Proposing Attack Surfaces -- 5.3 Finding Flow Errors -- 5.4 Mediating Flow Errors -- 5.5 Testing the Resulting System -- 6 Conclusions -- Improving Application Security through TLS-Library Redesign -- Introduction -- Related Work -- API Pitfalls -- Improved APIs and Static Analysis -- Privilege Separation -- Specialized Cryptographic Key Isolation -- Threat Model -- Design of libtlssep -- Libtlssep Architecture -- LibtlssepAPI and Configuration -- Security, Programmability, and Performance -- Security Benefits of libtlssep's API and Architecture -- Programmability -- Performance -- Conclusion -- How Not to Combine RC4 States -- 1 Introduction -- 1.1 Contribution and Organization of the Paper -- 2 Description and Analysis of the RC4B Stream Cipher -- 2.1 Description of RC4B -- 2.2 Analysis of RC4B -- 3 Description and Analysis of Quad-RC4 and m-RC4 Stream Ciphers -- 3.1 Description of Quad-RC4 -- 3.2 Analysis of Quad-RC4 -- 3.3 Description of m-RC4 -- 3.4 Analysis for Even m -- 3.5 Analysis for General m -- 3.6 The Flaws in the Design -- 4 Experimental Results -- 5 Conclusion -- Preimage Analysis of the Maelstrom-0 Hash Function -- 1 Introduction -- 2 Related Work -- 3 Specifications of Maelstrom-0 -- 4 Pseudo Preimage Attack on the 6-Round Reduced Compression Function -- 5 Preimage of the Maelstrom-0 Hash Function -- 6 Conclusion -- Meet-in-the-Middle Attacks on Round-Reduced Khudra -- 1 Introduction -- 2 Specifications of Khudra -- 2.1 Notations.
3 MitM Attacks on Round-Reduced Khudra -- 3.1 A MitM Attack on 13-Round Khudra -- 3.2 A MitM Attack on 14-Round Khudra -- 4 Conclusion and Discussion -- Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting -- 1 Introduction -- 2 Specification of Hierocrypt-L1 -- 3 A Differential Enumeration MitM Attack on HC-L1 -- 4 Conclusion -- S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels -- Introduction -- Known S-boxes with Good Properties -- The Case m Evaluating the Security of the Infective Countermeasure against DFA -- Security against Single Fault Injections -- Security against Multiple Fault Injection -- Instruction Skip Threats to the Infective Countermeasure -- Possible Attacks on the Infective Countermeasure: Affecting Flow Sequence -- The Instruction Skip Fault Model -- Instruction Skip Attack on the Infective Countermeasure -- The Information Leakage : A Formal Quantification -- The Loopholes in the Infective Countermeasure : A Closer Look -- A Modified Infective Countermeasure -- Instruction Skip Attack on the Modified Algorithm -- Simulation and Experimental Results -- Simulation Results -- Experimental Results -- Conclusions -- Security of the Bit String cstr in the Modified Countermeasure -- Modified Transparency Order Property: Solution or Just Another Attempt -- Introduction -- Related Work -- Our Contributions -- Preliminaries -- Optimal S-boxes -- Cryptographic Properties of S-boxes -- Affine Equivalence -- Generating S-boxes -- Random Search -- Genetic Algorithm -- Evolved S-boxes -- Affine Transformations -- Success Rate Evaluation of DPA Attacks on the Synthesized S-boxes -- Conclusion -- Investigating SRAM PUFsin large CPUs and GPUs -- 1 Introduction -- 2 Experimental Setup for the CPU -- 3 CPU Registers -- 3.1 Boot Process -- 3.2 Kernel -- 3.3 GRUB -- 3.4 Coreboot -- 4 CPU Cache -- 4.1 Cache Operation -- 4.2 Coreboot -- 5 GPU Experimental Setup -- 6 GPU Multiprocessor Shared Memory -- 7 Discussion -- 7.1 Future Work -- Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications -- Introduction -- Rationale of the RLUT -- Comparison with Dynamic Configuration -- RLUT and Security -- Destructive Applications of RLUT -- Adversary Model -- Trigger Design the Hardware Trojans -- Trojan Description -- Constructive Applications for RLUT -- Customizable Sboxes.
Sbox Scrambling for DPA Resistance -- Conclusions -- Trigger Generation for Hardware Trojans -- Architecture Considerations for Massively Parallel Hardware Security Platform -- Introduction -- Cryptography as a Service (CaaS) -- Levels of Trust and Security -- Usage Scenarios -- Typical Operations Needed for CaaS -- Preferred Properties of Cloud-Based High-Performance CaaS -- Building Hardware for CaaS Back-End -- Designing CaaS -- The Proposed Design -- Why Smart Cards? -- The Case Study: HMAC-Based One-Time Password -- Why Would HOTP Will Benefit from CaaS? -- Moving HOTP into CaaS -- HOTP Implementation -- Performance Results - A Single Card -- Improving Expected Performance -- Performance Results - Network of Processors -- Future Directions -- Conclusions -- Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers -- Introduction 2 pg -- Side-Channel Analysis on the AVR 1 pg -- Timing Analysis -- Simple Power Analysis -- Prime Field Arithmetic -- Arithmetic Modulo Ed25519 Group Order -- Scalar Multiplication -- Extended Twisted Edwards Coordinates -- Variable-Base Scalar Multiplication -- Flash Memory Address Leakage Through Power -- Fixed-Base ECSM for Ed25519 Key Generation and Signing -- Projective Coordinate Randomization -- Hashing and PRNG -- Elliptic Curve Protocols -- Benchmarking Results 1 pg -- Timing and Simple Power Analysis Leakage Evaluation -- Application of CRI's Methodology to ECC -- Measurement Setup and Capture of Power Traces -- SPA Leakage Analysis -- Side-Channel Analysis Results 1 pg -- Conclusion -- ATmega328P Microcontroller and Chipwhisperer -- Algorithms -- Towards Practical Attribute-Based Signatures -- 1 Introduction -- 2 About IRMA -- 3 IRMA's Selective Disclosure Proofs as Digital Signatures -- 3.1 IRMA Signature Scheme.
3.2 Diversification between SD Proofs Used for Authentication and Signatures.
Record Nr. UNINA-9910483202903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings / / edited by Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings / / edited by Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 333 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
ISBN 3-319-12060-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic building blocks -- Mini tutorial -- Attacks and countermeasures -- Tools and methods -- Secure systems and applications.
Record Nr. UNISA-996213649303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings / / edited by Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
Security, Privacy, and Applied Cryptography Engineering : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings / / edited by Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 333 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
ISBN 3-319-12060-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic building blocks -- Mini tutorial -- Attacks and countermeasures -- Tools and methods -- Secure systems and applications.
Record Nr. UNINA-9910483322403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui