6   Artículos

 
en línea
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Leonid Tymchenko,Vladimir Tverdomed,Nikolay Petrovsky,Natalya Kokryatskaya,Yurii Maistrenko     Pág. 21 - 27
A method for processing images of spots of laser beams is presented for systems using a modern and promising form of communication using atmospheric-optical communication lines (AOCL). The method allows to significantly expand the use of laser technology... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Krzysztof Golofit and Piotr Z. Wieczorek    
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys can ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »