Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Detecting insider threats: Solutions and trends

S Zeadally, B Yu, DH Jeong, L Liang - Information security journal …, 2012 - Taylor & Francis
Insider threats pose significant challenges to any organization. Many solutions have been
proposed in the past to detect insider threats. Unfortunately, given the complexity of the …

An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures

WB Hsieh, JS Leu - The Journal of Supercomputing, 2014 - Springer
As a smart phone becomes a daily necessity, mobile services are springing up. A mobile
user should be authenticated and authorized before accessing these mobile services …

S-box-based random number generation for stochastic computing

F Neugebauer, I Polian, JP Hayes - Microprocessors and Microsystems, 2018 - Elsevier
Stochastic circuits (SCs) offer tremendous area and power-consumption benefits at the
expense of computational inaccuracies. They require random number sources (RNSs) to …

Security & trusted devices in the context of internet of things (IoT)

N Sklavos, ID Zaharakis, A Kameas… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
This work targets to the technologies of the Internet of Things (IoT), regarding to security and
trusted devices. It provides to the readers a comprehensive understanding of both security …

Cryptoschemes based on dificulty of simultaneous solving two diferent dificult problems

A Berezin, N Moldovyan, V Shcherbacov - Computer Science Journal of …, 2013 - ibn.idsi.md
The paper proposes a general method for construction cryp-toschemes based on dificulty of
simultaneous solving factoring (FP) and discrete logarithm modulo prime problem (DLpP) …

Architecture design of an area efficient high speed crypto processor for 4G LTE

AN Bikos, N Sklavos - IEEE Transactions on Dependable and …, 2016 - ieeexplore.ieee.org
The whole security architecture of LTE/SAE (Long Term Evolution/System Architecture
Evolution) is being consisted of four main hardware-oriented cryptographic algorithms …

FPGA implementation of fractional-order Chua's chaotic system

AJ Abd El-Maksoud, AA Abd El-Kader… - … on modern circuits …, 2018 - ieeexplore.ieee.org
This paper introduces FPGA implementation of fractional order double scrolls chaotic system
based on Chua circuit. Grunwald-Letnikov's (GL) definition is used to generalize the chaotic …

BSD-based elliptic curve cryptography for the open Internet of Things

OP Pinol, S Raza, J Eriksson… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) is the interconnection of everyday physical objects with the
Internet and their representation in the digital world. Due to the connectivity of physical …

Chaotic clock driven cryptographic chip: Towards a DPA resistant AES processor

AA El-Moursy, AM Darya, AS Elwakil… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
Designing a tamper-resistant microchip for small embedded systems is one of the urgent
demands of the computing community nowadays due to the immense security challenges …