1![Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha](https://www.pdfsearch.io/img/2ca10fba8a001c9a9cdfbb283c381dff.jpg) | Add to Reading ListSource URL: backdoortolerance.orgLanguage: English - Date: 2018-03-13 07:04:44
|
---|
2![Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di](https://www.pdfsearch.io/img/732544a91dff5cbdef340ba15059bccc.jpg) | Add to Reading ListSource URL: smeiklej.comLanguage: English - Date: 2018-10-23 14:58:02
|
---|
3![A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University](https://www.pdfsearch.io/img/bf571588232dd118531e183567286c47.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-04-17 15:16:36
|
---|
4![Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg](https://www.pdfsearch.io/img/75bd2f3d726f6703571fe618c1e6f1cf.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-05-28 15:36:33
|
---|
5![Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis](https://www.pdfsearch.io/img/6657d934f9bc193072d3bb9f58584f20.jpg) | Add to Reading ListSource URL: backdoortolerance.orgLanguage: English - Date: 2018-03-13 07:04:44
|
---|
6![SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m](https://www.pdfsearch.io/img/1b7cc22dce9e7d76123f9345e5a5d9f2.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-03-21 11:51:07
|
---|
7![Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain](https://www.pdfsearch.io/img/c24d4baf51aa6f20b3c7c96705dce8c3.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-05-04 18:26:31
|
---|
8![Hardware Digital Signatures Lionello Lunesu Enuma Technologies Limited
Why? Hardware Digital Signatures Lionello Lunesu Enuma Technologies Limited
Why?](https://www.pdfsearch.io/img/962e4bd35e6bf5353491bf7a3df506ab.jpg) | Add to Reading ListSource URL: blog.enuma.ioLanguage: English - Date: 2018-08-08 01:49:05
|
---|
9![BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY](https://www.pdfsearch.io/img/b5485f6bb465102c928e13e5aa6076ab.jpg) | Add to Reading ListSource URL: prof.ict.ac.cnLanguage: English - Date: 2018-04-01 04:31:31
|
---|
10![Reconfigurable Hardware Implementation of Mesh Routing in the Number Field Sieve Factorization Sashisu Bajracharya1, Deapesh Misra1, Kris Gaj1, Tarek El-Ghazawi2 1 Reconfigurable Hardware Implementation of Mesh Routing in the Number Field Sieve Factorization Sashisu Bajracharya1, Deapesh Misra1, Kris Gaj1, Tarek El-Ghazawi2 1](https://www.pdfsearch.io/img/1a4954f2fa55c2b5f1e150d60c1bcdb2.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2005-03-13 11:15:52
|
---|