Experimental analysis and implementation of bit level permutation instructions for embedded security
暂无分享,去创建一个
G. Bansod | Aman Gupta | Arun Ghosh | Gajraj Bishnoi | Chitrangdha | Sawhney | H. Ankit | GAURAV BANSOD | AMAN GUPTA | ARUNIKA GHOSH | GAJRAJ BISHNOI | CHITRANGDHA | SAWHNEY | HARSHITA ANKIT | A. Ghosh
[1] Josep Domingo-Ferrer,et al. Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.
[2] Ruby B. Lee,et al. Bit permutation instructions for accelerating software cryptography , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.
[3] Hendrik Schweppe. Securing car2X applications with effective hardware-software co-design for vehicular on-board networks , 2011 .
[4] Ronald L. Rivest,et al. On permutation operations in cipher design , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[5] P Karthigaikumar,et al. Hardware Implementation of Low Power Audio Sub word Sorter Unit for High SecurityTransmission , 2009 .
[6] Patrick Schaumont,et al. Domain-Specific Codesign for Embedded Security , 2003, Computer.
[7] Stefan Kowalewski,et al. Hardware/Software Design Considerations for Automotive Embedded Systems , 2008, IEEE Transactions on Industrial Informatics.
[8] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[9] Ruby B. Lee,et al. Subword sorting with versatile permutation instructions , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[10] Patrick Schaumont,et al. Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks , 2013, IEEE Transactions on Computers.
[11] Patrick Schaumont,et al. Securing embedded systems , 2006, IEEE Security & Privacy.
[12] Ludovic Apvrille,et al. Secure automotive on-board electronics network architecture , 2010 .