咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 理学
    • 1 篇 数学

主题

  • 1 篇 registers
  • 1 篇 public key crypt...
  • 1 篇 computer archite...
  • 1 篇 security
  • 1 篇 hardware
  • 1 篇 malware
  • 1 篇 lenses

机构

  • 1 篇 secured embedded...
  • 1 篇 secured embedded...
  • 1 篇 iit kharagpur se...
  • 1 篇 centre for artif...

作者

  • 2 篇 vidya govindan
  • 2 篇 rajat subhra cha...
  • 1 篇 mukhopadhyay deb...
  • 1 篇 manaar alam
  • 1 篇 roy debapriya ba...
  • 1 篇 aditya kumar cha...
  • 1 篇 debdeep mukhopad...
  • 1 篇 debapriya basu r...
  • 1 篇 das poulami
  • 1 篇 sarani bhattacha...
  • 1 篇 pranesh santikel...

语言

  • 3 篇 英文
检索条件"机构=Secured Embedded Architecture Laboratory"
3 条 记 录,以下是1-10 订阅
排序:
Improved atomicity to prevent HCCA on NIST curves  3
Improved atomicity to prevent HCCA on NIST curves
收藏 引用
3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016
作者: Das, Poulami Roy, Debapriya Basu Mukhopadhyay, Debdeep Secured Embedded Architecture Laboratory Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India
The Big Mac attack showed that an RSA implementation, protected with conventional side-channel countermeasures can be exploited on the basis of an operand sharing property of field multiplications with a single trace ... 详细信息
来源: 评论
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC  16
SmashClean: A hardware level mitigation to stack smashing at...
收藏 引用
ACM and IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE)
作者: Manaar Alam Debapriya Basu Roy Sarani Bhattacharya Vidya Govindan Rajat Subhra Chakraborty Debdeep Mukhopadhyay IIT Kharagpur Secured Embedded Architecture Laboratory India
Buffer overflow and stack smashing have been one of the most popular software based vulnerabilities in literature. There have been multiple works which have used these vulnerabilities to induce powerful attacks to tri... 详细信息
来源: 评论
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection
收藏 引用
Journal of Hardware and Systems Security 2018年 第3期2卷 225-239页
作者: Vidya Govindan Rajat Subhra Chakraborty Pranesh Santikellur Aditya Kumar Chaudhary Secured Embedded Architecture Laboratory (SEAL) Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Kharagpur India Centre for Artificial Intelligence and Robotics DRDO Complex Bangalore India
True Random Number Generator (TRNG) circuits are important components of cryptographic systems. Lack of statistical randomness in the generated bitstreams from a TRNG can result in compromised keys, leading to serious...
来源: 评论