Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Memory encryption: A survey of existing techniques

M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …

[图书][B] On-chip communication architectures: system on chip interconnect

S Pasricha, N Dutt - 2010 - books.google.com
Over the past decade, system-on-chip (SoC) designs have evolved to address the ever
increasing complexity of applications, fueled by the era of digital convergence …

Towards a truly integrated vector processing unit for memory-bound applications based on a cost-competitive computational SRAM design solution

M Kooli, A Heraud, HP Charles, B Giraud… - ACM Journal on …, 2022 - dl.acm.org
This article presents Computational SRAM (C-SRAM) solution combining In-and Near-
Memory Computing approaches. It allows performing arithmetic, logic, and complex memory …

[图书][B] Heterogeneous computing: Hardware and software perspectives

M Zahran - 2019 - books.google.com
If you look around you will find that all computer systems, from your portable devices to the
strongest supercomputers, are heterogeneous in nature. The most obvious heterogeneity is …

[图书][B] Statistical trend analysis of physically unclonable functions: An approach via text mining

B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra - 2021 - taylorfrancis.com
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …

Operating system controlled processor-memory bus encryption

X Chen, RP Dick, A Choudhary - … on Design, automation and test in …, 2008 - dl.acm.org
Unencrypted data appearing on the processor-memory bus can result in security violations,
eg, allowing attackers to gather keys to financial accounts and personal data. Although on …

Differential power analysis attacks to precharged buses: a general analysis for symmetric-key cryptographic algorithms

M Alioto, M Poli, S Rocchi - IEEE Transactions on Dependable …, 2009 - ieeexplore.ieee.org
In this paper, a general model of multibit Differential Power Analysis (DPA) attacks to
precharged buses is discussed, with emphasis on symmetric-key cryptographic algorithms …

Defending against attacks on main memory persistence

W Enck, K Butler, T Richardson… - 2008 Annual …, 2008 - ieeexplore.ieee.org
Main memory contains transient information for all resident applications. However, if memory
chip contents survives power-off, eg, via freezing DRAM chips, sensitive data such as …

Secure communication in microcomputer bus systems for embedded devices

S Mühlbach, S Wallner - Journal of Systems Architecture, 2008 - Elsevier
The protection of the microcomputer bus system in embedded devices is essential to prevent
eavesdropping and the growing number of todays hardware hacking attacks. This …