Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Saleh Mulhem"'
Autor:
Enkele Rama, Mouadh Ayache, Rainer Buchty, Bernhard Bauer, Matthias Korb, Mladen Berekovic, Saleh Mulhem
Publikováno v:
IEEE Access, Vol 12, Pp 69603-69632 (2024)
The trustworthiness of integrated circuits (ICs) has become increasingly important due to the ubiquitousness of ICs and the insecure nature of the current semiconductor supply chain. Throughout development and operation, ICs are exposed to several ri
Externí odkaz:
https://doaj.org/article/07e719970a054a62aeeb908817687699
Publikováno v:
Cryptography, Vol 5, Iss 4, p 32 (2021)
Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment
Externí odkaz:
https://doaj.org/article/a6289d363639480cb0a8000811ab2775
Publikováno v:
Cryptography, Vol 4, Iss 3, p 19 (2020)
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and tr
Externí odkaz:
https://doaj.org/article/97e4e95a3a60454382b24f1c4b4b0945
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities
Publikováno v:
Cryptography, Vol 4, Iss 1, p 6 (2020)
New large classes of permutations over based on T-Functions as Self-Inverting Permutation Functions (SIPFs) are presented. The presented classes exhibit negligible or low complexity when implemented in emerging FPGA technologies. The target use of su
Externí odkaz:
https://doaj.org/article/5448732ce80042a48af8d702361b2e18
Autor:
Bernhard Bauer, Mouadh Ayache, Saleh Mulhem, Meirav Nitzan, Jyotika Athavale, Rainer Buchty, Mladen Berekovic
Publikováno v:
Computer. 55:99-106
Publikováno v:
Cryptography
Volume 5
Issue 4
Cryptography, Vol 5, Iss 32, p 32 (2021)
Volume 5
Issue 4
Cryptography, Vol 5, Iss 32, p 32 (2021)
Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment
Publikováno v:
Applied Reconfigurable Computing. Architectures, Tools, and Applications ISBN: 9783030790240
ARC
ARC
Deploying a physically unclonable trusted anchor is required for securing software running on embedded systems. Common mechanisms combine secure boot with either stored secret keys or keys extracted from a Physical Unclonable Function (PUF). We propo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::55713f69d3a1e5e648269347f65a1f4c
https://doi.org/10.1007/978-3-030-79025-7_14
https://doi.org/10.1007/978-3-030-79025-7_14
Publikováno v:
Cryptography, Vol 4, Iss 19, p 19 (2020)
Cryptography
Volume 4
Issue 3
Cryptography
Volume 4
Issue 3
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient&rsquo
s information are extract
s information are extract
Publikováno v:
2019 International Conference on Cyber Security for Emerging Technologies (CSET).
The emerging network technologies are deploying powerful smart-devices and at the same time result with more open environment operational threats. The need for a highly secure robust biology-like device identity is growing day after day. In particula
Publikováno v:
MIPRO
A new large cipher class based on new two variable self-inverse-permutation deploying Golden S-Boxes is presented. The mapping has particular properties, in that it is both self-inverse and uses arithmetic over the ring of integers modulo $2^{{\mathr