Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Johannes Wolkerstorfer"'
Autor:
Johannes Wolkerstorfer
Publikováno v:
Data Privacy Management and Autonomous Spontaneous Security ISBN: 9783642193477
DPM/SETOP
DPM/SETOP
Network service providers monitor the data flow to detect anomalies and malicious behavior in their networks. Network monitoring inspects the data flow over time and thus has to store packet data. Storing of data impedes the privacy of users. A radic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::86343ab2488f0825f1ee9930ff845b4c
https://doi.org/10.1007/978-3-642-19348-4_5
https://doi.org/10.1007/978-3-642-19348-4_5
Publikováno v:
Integrated Network Management
Web-based management solutions have become an increasingly important and promising approach especially for small and embedded environments. This article presents the design and implementation of an embedded system that leverages the Web-based Enterpr
Publikováno v:
Selected Areas in Cryptography ISBN: 9783642041587
Selected Areas in Cryptography
Selected Areas in Cryptography
This paper presents the silicon chip ECCon, an Elliptic Curve Cryptography processor for application in Radio-Frequency Identification. The circuit is fabricated on a 180 nm CMOS technology. ECCon features small silicon size (15K GE) and has low powe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::71d292620d20dbbbb1ae63b1e19ec0a1
https://doi.org/10.1007/978-3-642-04159-4_26
https://doi.org/10.1007/978-3-642-04159-4_26
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783642019562
ACNS
ACNS
The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::592dbe0d271efe9c16bfa60ef7b01355
https://doi.org/10.1007/978-3-642-01957-9_32
https://doi.org/10.1007/978-3-642-01957-9_32
Autor:
Johannes Wolkerstorfer, Thomas Matyus, Alexander Szekely, Andreas Neppach, Momtchil Peev, C. Pfaffel-Janser, Thomas Lorünser, Michael Hutter, E. Querasser, Ilse Wimberger
Publikováno v:
ASAP
We present a fully operable security gateway prototype, integrating quantum key distribution and realised as a system-on-chip. It is implemented on a field-programmable gate array and provides a virtual private network with low latency and gigabit th
Publikováno v:
RFID Security ISBN: 9780387764801
This book chapter provides an overview about hardware implementations of symmetric crypto algorithms for RFID security. Hardware design for RFID tags is challenging due to the fierce constraints concerning power consumption and chip area. After a gen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dad114ac7bc643fc2a588da981823286
https://doi.org/10.1007/978-0-387-76481-8_15
https://doi.org/10.1007/978-0-387-76481-8_15
Autor:
Johannes Wolkerstorfer, Georg Hofferek
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783540858928
CARDIS
CARDIS
Equipping branded goods with RFID tags is an effective measure to fight the growing black market of counterfeit products. Asymmetric cryptography is the technology of choice to achieve strong authentication but suffers from its ample demand of area a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e626151c37cf26963871638fe8d70cc8
https://doi.org/10.1007/978-3-540-85893-5_12
https://doi.org/10.1007/978-3-540-85893-5_12
Publikováno v:
Cryptographic Hardware and Embedded Systems-CHES 2007 ISBN: 9783540747345
CHES
CHES
This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high throughput applications to combine data encryption and message authentication on FPG
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5855d403e2168722d1f4f644ed937189
https://doi.org/10.1007/978-3-540-74735-2_16
https://doi.org/10.1007/978-3-540-74735-2_16
Publikováno v:
Topics in Cryptology — CT-RSA 2002 ISBN: 9783540432241
CT-RSA
CT-RSA
This article presents a hardware implementation of the S-Boxes from the Advanced Encryption Standard (AES). The SBoxes substitute an 8-bit input for an 8-bit output and are based on arithmetic operations in the finite field GF(28). We show that a cal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cdb3ec5868599ba0ffbb294f8fbb90a0
https://doi.org/10.1007/3-540-45760-7_6
https://doi.org/10.1007/3-540-45760-7_6
Publikováno v:
ISCAS
The implementation of security protocols in RFID systems is challenging because of the fierce constraints concerning power consumption and low die size of RFID tags. The choice of the appropriate cryptographic primitive is difficult because there are