Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Johann Heyszl"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most password-related security issues and improve security indisputably. However, we would like to highlight t
Externí odkaz:
https://doaj.org/article/d7c428c7cb84494892f996a4a238be33
Autor:
Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 4 (2020)
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be con
Externí odkaz:
https://doaj.org/article/62cfab4cd7a1499d8a8caf19e0a32e5b
Autor:
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”. They report a significant reduction of the average remaining entropy of cryptographic k
Externí odkaz:
https://doaj.org/article/79bc00caf3614439bd6e208459d6d41a
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 1 (2018)
We present the first hardware implementations of Diffie-Hellman key exchange based on the Kummer surface of Gaudry and Schost’s genus-2 curve targeting a 128-bit security level. We describe a single-core architecture for lowlatency applications and
Externí odkaz:
https://doaj.org/article/be2b20a2470540f98d4b38f87d087581
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783031294969
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::95c44d253b89627b2f26d77ccf72e5c0
https://doi.org/10.1007/978-3-031-29497-6_4
https://doi.org/10.1007/978-3-031-29497-6_4
Publikováno v:
Unterstein, F, Jacob, N, Hanley, N, Gu, C & Heyszl, J 2020, ' SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version ', Journal of Cryptographic Engineering . https://doi.org/10.1007/s13389-020-00247-2
FPGA system on chips (SoCs) are ideal computing platforms for edge devices in applications which require high performance through hardware acceleration and updatability due to long operation in the field. A secure update of hardware functionality can
Publikováno v:
Foundations and Practice of Security ISBN: 9783031081460
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2d76f66fbdc7f6591176420a1b12bf9e
https://doi.org/10.1007/978-3-031-08147-7_6
https://doi.org/10.1007/978-3-031-08147-7_6
Publikováno v:
WISEC
Setting up a large-scale wireless sensor network is challenging, as firmware must be distributed and trust between sensor nodes and a backend needs to be established. To perform this task efficiently, we propose an approach named Box, which utilizes
Publikováno v:
Unterstein, F, Jacob, N, Hanley, N, Gu, C & Heyzl, J 2019, SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption . in ASHES 2019-Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop . Proceedings of the ACM Conference on Computer and Communications Security, ACM, pp. 45-53, 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES 2019, a Post-Conference Satellite Workshop of the ACM Conference on Computer and Communications Security, CCS 2019, London, United Kingdom, 15/11/2019 . https://doi.org/10.1145/3338508.3359573, https://doi.org/10.1145/3338508.3359573
ASHES@CCS
ASHES@CCS
FPGA system on chips (SoCs) are ideal computing platforms for edge devices in applications which require high performance through hardware acceleration and updatability due to long operation in the field. A secure update of hardware functionality can
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::436a75a363c4ae8b7c09c67c4b5d910f
https://pure.qub.ac.uk/en/publications/sca-secure-and-updatable-crypto-engines-for-fpga-soc-bitstream-decryption(eea5a288-1944-439f-ac8f-d9f14d069da1).html
https://pure.qub.ac.uk/en/publications/sca-secure-and-updatable-crypto-engines-for-fpga-soc-bitstream-decryption(eea5a288-1944-439f-ac8f-d9f14d069da1).html
Publikováno v:
it - Information Technology. 59:223-231
Virtualization plays an important role for embedded systems where hardware support can prove beneficial, but these systems also pose a challenge due to power, resource constraints; reliability, safety, real-time requirements; diversity of devices, an