Secure Data Transmission using Hybrid Crypto Processor based on AES and HMAC Algorithms

S Umamaheswari, NR Vishal… - … on Advancements in …, 2023 - ieeexplore.ieee.org
In today's digital age, vulnerabilities in digital platforms have become a major concern, as
cyber-attacks can lead to significant financial losses and privacy breaches. Encryption and …

PreSIT: Predict Cryptography Computations in SGX-Style Integrity Trees

X Wang, L Feng, Z Wang - IEEE Transactions on Computer …, 2024 - ieeexplore.ieee.org
In recent years, SGX-style integrity trees (SITs) have been applied in trusted execution
environments (TEEs) to protect the off-chip memory security from physical attacks, replay …

WIP: The Feasibility of High-performance Message Authentication in Automotive Ethernet Networks

E Allen, Z Bowden, R Marchany, JS Ransbottom - 2023 - vtechworks.lib.vt.edu
Modern vehicles are increasingly connected systems that expose a wide variety of security
risks to their users. Message authentication prevents entire classes of these attacks, such as …

Protecting Vehicles from Remote Attackers with Firewalls and Switched Networks

EN Allen - 2024 - vtechworks.lib.vt.edu
Remote attacks on vehicles have become alarmingly more common over the past decade.
Attackers often can compromise a single Electronic Control Unit (ECU) in the In-Vehicle …

Implementation of Efficient Low Power SHA-256 Algorithm

KS Kulkarni, SS Rekha, S Kumar - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Secure Hash Algorithm-256 (SHA-256) is widely used in many applications for its high level
of security. Many authors have worked on increasing the frequency and throughput of SHA …

Software and Hardware Processing Method for Blockchain Light Node SPV Verification

J Yan, F Zou, X Cao - 2023 IEEE Intl Conf on Parallel & …, 2023 - ieeexplore.ieee.org
With the application of blockchain light nodes in embedded devices, how to alleviate
computing pressure brought by complex operations such as transaction's SPV Verification …

[PDF][PDF] Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design.

S Suhaili, N Julai, R Sapawi… - Pertanika Journal of …, 2024 - researchgate.net
Some applications, such as Message Authentication Code (MAC), rely on different hashing
operations. There are various hash functions, including Message-Digest 5 (MD5), RACE …

Implementation of a Hash-based Secure Core for Integrity and Authentication of Data in Space Applications on Space-grade FPGAs

L Crocetti, F Falaschi, S Saponara… - 2023 IEEE 2nd …, 2023 - ieeexplore.ieee.org
Space applications, encompassing satellites, space stations, and ground-based
infrastructure, are increasingly reliant on interconnected digital systems to function …

An Unrolled and Pipelined Architecture for SHA2 Family of Hash Functions on FPGA

OB Gamgam - 2023 16th International Conference on …, 2023 - ieeexplore.ieee.org
Cryptographic hash function is an important part of information security due to the need of
integrity verification. Message compression is the most time-consuming process in the SHA2 …