Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic services
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Run-Time Attack Detection in Cryptographic APIs
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
proof-of-concept log analysis tool
Wrapping
tools
standards
sensitive cryptographic keys
security of data
security API
run-time attack detection
Resiliency
resilience
pubcrawl
Proposals
APIs
PKCS\#11
Monitoring
key-management attacks
key security
financial infrastructures
Cryptography
cryptographic services
cryptographic API
critical infrastructures
Compositionality
application program interfaces
biblio
\#x03BC;Leech: A Side-Channel Evaluation Platform for IoT
Submitted by grigby1 on Tue, 02/06/2018 - 12:59pm
side-channel
Protocols
pubcrawl
Radiation detectors
Resiliency
Resistance
Resistors
security critical applications
security of data
power trace acquisition
side-channel evaluation platform
smart phone
smart phones
square point-of-sale reader
telecommunication security
trusted platform modules
wireless channels
μLeech
IoT
clock manipulation attack
composability
computer network security
cryptographic services
Cryptography
embedded trusted platform module
internet
Internet of Things
Capacitors
IoT device
Low power
microphone-speaker interface
microphones
next generation networks
next generation power scavenging devices
physical security analysis