<--- Back to Details
First PageDocument Content
Cryptography / Computer security / Computer hardware / Cyberwarfare / ISO standards / Hardware Trojan / Hardware security module / Secure cryptoprocessor / Hardware security / Trusted Platform Module / Smart card
Date: 2018-03-13 07:04:44
Cryptography
Computer security
Computer hardware
Cyberwarfare
ISO standards
Hardware Trojan
Hardware security module
Secure cryptoprocessor
Hardware security
Trusted Platform Module
Smart card

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Download Document from Source Website

File Size: 2,18 MB

Share Document on Facebook

Similar Documents

Cryptography / Computer security / Computer hardware / Cyberwarfare / ISO standards / Hardware Trojan / Hardware security module / Secure cryptoprocessor / Hardware security / Trusted Platform Module / Smart card

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

DocID: 1xW1l - View Document

Cryptography / Computer security / Computer hardware / Hardware security module / Hardware security / Tamper resistance

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

DocID: 1xVDt - View Document

Algebra / Linear algebra / Mathematics / Numerical linear algebra / Matrices / Matrix theory / Multiplication / Gaussian elimination / Matrix multiplication / Pivot element / Invertible matrix / Matrix

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

DocID: 1xVrH - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Unlocking Wealth from the Blockchain for Everyone 5M White Paper Token Security Scheme (TSS) incorporating Distributed Hardware Security Modules (DHSMs) for

DocID: 1vmeJ - View Document