A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm (English)
- New search for: Tu, Chenyang
- New search for: He, Wei
- New search for: Gao, Neng
- New search for: Torre, Eduardo
- New search for: Liu, Zeyi
- New search for: Liu, Limin
- New search for: Tu, Chenyang
- New search for: He, Wei
- New search for: Gao, Neng
- New search for: Torre, Eduardo
- New search for: Liu, Zeyi
- New search for: Liu, Limin
In:
ISPEC, Information Security Practice and Experience Conference, 10
;
217-231
;
2014
-
ISSN:
- Conference paper / Print
-
Title:A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm
-
Contributors:Tu, Chenyang ( author ) / He, Wei ( author ) / Gao, Neng ( author ) / Torre, Eduardo ( author ) / Liu, Zeyi ( author ) / Liu, Limin ( author )
-
Published in:Lecture Notes in Computer Science ; 8434 ; 217-231
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2014
-
Size:15 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Access Control in and Around the BrowserGollmann, D. et al. | 2014
- 8
-
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical ToolsAbdalla, M. / Chabanne, H. / Ferradi, H. / Jainski, J. / Naccache, D. et al. | 2014
- 15
-
Preserving Receiver-Location Privacy in Wireless Sensor NetworksLopez, J. / Rios, R. / Cuellar, J. et al. | 2014
- 28
-
Data Security and Privacy in the CloudSamarati, P. et al. | 2014
- 42
-
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic ProtocolsKutylowski, M. / Hanzlik, L. / Kluczniak, K. / Kubiak, P. / Krzywiecki, L. et al. | 2014
- 60
-
A CAPTCHA Scheme Based on the Identification of Character LocationsNguyen, V.D. / Chow, Y.-W. / Susilo, W. et al. | 2014
- 75
-
A Multiprocess Mechanism of Evading Behavior-Based Bot Detection ApproachesJi, Y. / He, Y. / Zhu, D. / Li, Q. / Guo, D. et al. | 2014
- 90
-
Obfuscating Encrypted Web Traffic with Combined ObjectsTang, Y. / Lin, P. / Luo, Z. et al. | 2014
- 105
-
A Website Credibility Assessment Scheme Based on Page AssociationLi, P. / Mao, J. / Wang, R. / Zhang, L. / Wei, T. et al. | 2014
- 119
-
A Methodology for Hook-Based Kernel Level RootkitsChen, C.-M. / Wu, M.-E. / He, B.-Z. / Zheng, X. / Hsing, C. / Sun, H.-M. et al. | 2014
- 129
-
Precise Instruction-Level Side Channel Profiling of Embedded ProcessorsMsgna, M. / Markantonakis, K. / Mayes, K. et al. | 2014
- 144
-
Automated Proof for Authorization Protocols of TPM 2.0 in Computational ModelWang, W. / Qin, Y. / Feng, D. et al. | 2014
- 159
-
SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector MachineHou, Y. / Zhuge, J.W. / Xin, D. / Feng, W. et al. | 2014
- 172
-
HDROP: Detecting ROP Attacks Using Performance Monitoring CountersZhou, H. / Wu, X. / Shi, W. / Yuan, J. / Liang, B. et al. | 2014
- 187
-
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAsTang, S. / Lv, B. / Chen, G. / Peng, Z. et al. | 2014
- 202
-
High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing UnitCui, S. / Grossschadl, J. / Liu, Z. / Xu, Q. et al. | 2014
- 217
-
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto AlgorithmTu, C. / He, W. / Gao, N. / de la Torre, E. / Liu, Z. / Liu, L. et al. | 2014
- 232
-
Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power AnalysisWang, D. / Wang, A. / Zheng, X. et al. | 2014
- 247
-
Implementing a Covert Timing Channel Based on Mimic FunctionWang, J. / Guan, L. / Liu, L. / Zha, D. et al. | 2014
- 262
-
Detecting Frame Deletion in H.264 VideoLiu, H. / Li, S. / Bian, S. et al. | 2014
- 271
-
Efficient Adaptive Oblivious Transfer in UC FrameworkGuleria, V. / Dutta, R. et al. | 2014
- 287
-
Multi-receiver Authentication Scheme for Multiple Messages Based on Linear CodesZhang, J. / Li, X. / Fu, F.-W. et al. | 2014
- 302
-
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret SharingNojoumian, M. / Stinson, D.R. et al. | 2014
- 318
-
Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear GroupsZhang, J. / Zhang, F. et al. | 2014
- 330
-
Proofs of Retrievability Based on MRD CodesHan, S. / Liu, S. / Chen, K. / Gu, D. et al. | 2014
- 346
-
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcingJiang, T. / Chen, X. / Li, J. / Wong, D.S. / Ma, J. / Liu, J. et al. | 2014
- 359
-
Improvement of a Remote Data Possession Checking Protocol from Algebraic SignaturesYu, Y. / Ni, J. / Ren, J. / Wu, W. / Chen, L. / Xia, Q. et al. | 2014
- 373
-
Distributed Pseudo-Random Number Generation and Its Application to Cloud DatabaseChen, J. / Miyaji, A. / Su, C. et al. | 2014
- 388
-
A Provably Secure Ring Signature Scheme with Bounded Leakage ResilienceWang, H. / Wu, Q. / Qin, B. / Zhang, F. / Domingo-Ferrer, J. et al. | 2014
- 403
-
Two-Party (Blind) Ring Signatures and Their ApplicationsAu, M.H. / Susilo, W. et al. | 2014
- 418
-
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group ModelTang, F. / Li, H. / Niu, Q. / Liang, B. et al. | 2014
- 433
-
Attribute-Based Signature with Message RecoveryWang, K. / Mu, Y. / Susilo, W. / Guo, F. et al. | 2014
- 448
-
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data SharingLiang, K. / Au, M.H. / Susilo, W. / Wong, D.S. / Yang, G. / Yu, Y. et al. | 2014
- 462
-
Multi-recipient Encryption in Heterogeneous SettingWei, P. / Zheng, Y. / Wang, W. et al. | 2014
- 481
-
ACP-IrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key LeakageZhang, M. et al. | 2014
- 481
-
ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key LeakageZhang, Mingwu et al. | 2014
- 496
-
Provably Secure Certificateless Authenticated Asymmetric Group Key AgreementZhang, L. / Wu, Q. / Qin, B. / Deng, H. / Liu, J. / Shi, W. et al. | 2014
- 511
-
New Variants of Lattice Problems and Their NP-HardnessLi, W. et al. | 2014
- 524
-
Improved Preimage Attacks against Reduced HAS-160Hao, R. / Li, B. / Ma, B. / Li, X. et al. | 2014
- 537
-
Modular Inversion Hidden Number Problem RevisitedXu, J. / Hu, L. / Huang, Z. / Peng, L. et al. | 2014
- 552
-
On the Recursive Construction of MDS Matrices for Lightweight CryptographyXu, H. / Tan, L. / Lai, X. et al. | 2014
- 564
-
On Constructions of Circulant MDS Matrices for Lightweight CryptographyGupta, K.C. / Ray, I.G. et al. | 2014