搜索结果: 1-15 共查到“密码学 Reconfigurable”相关记录15条 . 查询时间(0.062 秒)
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus
Reconfigurable Byzantine Consensus proof-of-work
2017/11/27
The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of...
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
side-channel protection TI FPGA
2016/12/7
First-order secure Threshold Implementations (TI) of symmetric
cryptosystems provide provable security at a moderate overhead;
yet attacks using higher-order statistical moments are still feasible. ...
Low Power Montgomery Modular Multiplication on Reconfigurable Systems
elliptic curve cryptosystem modular multiplication montgomery algorithm
2016/3/14
This paper presents an area-optimized FPGA architecture of the Montgomery modular multiplication algorithm on a low power reconfigurable IGLOO?2 FPGA of Microsemi? Our contributions consist of the map...
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Ideal Lattices Gaussian Sampling Digital Signatures
2016/1/23
The recent Bimodal Lattice Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. It offers small signatures of 5600 bits for a 128-bi...
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
Reconfigurable LUT (RLUT) FPGA CFGLUT5,
2016/1/4
Modern FPGAs offer various new features for enhanced reconfigurability
and better performance. One of such feature is a dynamically
Reconfigurable LUT (RLUT) whose content can be updated internally,...
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
side-channel protection FPGA masking
2016/1/3
Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of first-order side-channel protection for cryptographic primitives at the cost of a significant reconfiguration...
Foundations of Reconfigurable PUFs
Physically Unclonable Functions Logically Reconfigurable Tamper-resistance
2015/12/31
A Physically Unclonable Function (PUF) can be seen as a
source of randomness that can be challenged with a stimulus and responds
in a way that is to some extent unpredictable. PUFs can be used to pr...
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Design Security and Trust Hardware Trojans
2015/12/30
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA application design and development
process in conjunction with the inadequate bitstream protection measure...
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Homomorphic encryption ring learning with errors FPGA
2015/12/29
Homomorphic encryption allows computation on encrypted data and makes it possible
to securely outsource computational tasks to untrusted environments. However, all proposed
schemes are quite ineffic...
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
crypto engine SIMON FPGA
2015/12/24
There is a significant effort in building lightweight cryptographic
operations, yet the proposed solutions are typically singlepurpose
modules that can implement a single functionality. In contrast,...
Reconfigurable Cryptography: A flexible approach to long-term security
long-term security security definitions public-key cryptography
2015/12/21
Reconfigurable Cryptography: A flexible approach to long-term security.
Recyclable PUFs: Logically Reconfigurable PUFs
implementation / Logically Reconfigurable Physically Unclonable Functions (PUFs)
2012/3/23
Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic random physical variations of hardware components. In the recent years, many security solutions based on PUFs have...
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
secret-key cryptography / Grain-128 stream cipher cryptanalysis cube attacks cube testers RIVYERA experimental verification
2012/3/28
In this paper we describe the first single-key attack which can break the full version of Grain-128 for arbitrary keys by an algorithm which is considerably faster than exhaustive search (by a factor ...
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
Grain-128 stream cipher cryptanalysis cube attacks cube testers RIVYERA experimental verification
2011/6/9
In this paper we describe the first single-key attack which can break the full version of Grain-128 for arbitrary keys by an algorithm which is considerably faster than exhaustive search (by a factor ...
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Reconfigurable Hardware Tweakable Enciphering Schemes
2008/5/22
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can be used as the main bu...