The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secrecy in communication is critical for people that have sensitive information. Steganography is a field that secures sensitive information by hiding it inside media files (such as images). What makes the concept of steganography powerful is that the secret message is hidden cleverly within the media file and thus carried around invisibly. Our paper proposed an automated method to secure a message...
This paper proposes a new systolic array architecture to perform inversion operation in ${\mathrm{ GF}}(2^{m})$ based on a previously modified extended Euclidean algorithm. This architecture has low area and power complexities and it achieves a moderate speed. This architecture is explored by applying a regular technique to the inversion algorithm. The systolic architecture obtained has simple structure...
In this paper, we are targeting Altera Cyclone IV FPGA family to design an efficient GCD (Greatest Common Divisor) coprocessor based on Euclid's method with variable datapath sizes. The design was synthesized using seven chip technologies in terms of maximum frequency and critical path delay of the coprocessor. As a result, the comparison between different FPGA devices shows that Xilinx devices XC7VH290T-2-HCG1155...
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities...
Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most of the current research concentrates on detecting Trojans at the testing phase by comparing the suspected circuit to a golden (trusted) one. However, these attempts do not work in the case of third party IPs, which are black boxes with...
In this paper we presents the design of a very low power and high throughput AES processor. A sophisticated AES algorithm without sacrificing its security features, throughput and area is used to design the processor. Due to the optimization of the algorithm and a number of design considerations, the processor shows its superiority over other AES processors. The proposed processor is simulated on...
Biometric recognition systems offer greater security and are more convenient than traditional methods of personal recognition. At the same time, the security of the biometric system itself has become more and more important. Of these, the fingerprints are one the most widely used form of biometric identification. In this paper, the commercially-used encryption/decryption algorithm such as AES with...
Wireless networks are on the cutting edge of modern technology and rapidly gaining popularity in todaypsilas world due to their excellent usability. For secure wireless data transmission, Wired Equivalent Privacy (WEP), IEEE 802.11 standard defined security protocol, is employed. WEP has a potential limitation that stems from its adaptation of RC4 stream cipher algorithm. As a result, there is a pressing...
Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices. Also an active attacker can induce errors during computation and exploit...
The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly addresses the issues related to the PC weaknesses like the combination of key loggers and spyware software. The device uses exclusively symmetric encryption (AES) that ties the device directly to the payment server base at fabrication time. The device is connected to the...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multiplication level and lower point operations level. We combine the inherited parallelism in both levels to reduce the delay and improve security against the simple power attack. The best security and speed performance is achieved when parallelizing the computation to eight parallel multiplication operations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.