Narrow your search

Library

KU Leuven (125)

KBR (13)

UCLL (6)

ULiège (6)

Odisee (5)

VIVES (5)

AP (4)

KDG (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

More...

Resource type

dissertation (116)

book (14)

digital (4)


Language

English (95)

Dutch (18)

Undetermined (18)


Year
From To Submit

2024 (8)

2023 (8)

2022 (9)

2021 (7)

2020 (13)

More...
Listing 1 - 10 of 131 << page
of 14
>>
Sort by

Book
Secure integrated circuits and systems
Author:
ISSN: 00653195 ISBN: 0387718273 0387565795 9786612837883 1282837885 038771829X 3540565795 9783540565796 354047594X 9780387565798 1461425662 Year: 2010 Volume: 108 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security and cryptography needed for such devices from an implementation perspective. The editor provides basic coverage of the mathematics of cryptography, basic security attack strategies, the architecture and implementation options of many security primitives and modules, and design methods for security. Applications covered include security for RFID and sensor nodes, security for FPGAs, smart-cards and flash memories. Secure Integrated Circuits and Systems is a valuable resource for those working on integrated circuits as well as for the embedded systems designer who designs for ASICs, FPGAs and small embedded processors.

Keywords

Computer security. --- Integrated circuits -- Design and construction. --- Systems on a chip. --- Integrated circuits --- Computer security --- Systems on a chip --- Electrical & Computer Engineering --- Electrical Engineering --- Engineering & Applied Sciences --- Design and construction --- Integrated circuits. --- Protection. --- Chips (Electronics) --- Circuits, Integrated --- Computer chips --- Microchips --- Diffusion (Physique nucléaire) --- Propriétés optiques --- 678.07 --- -Scattering (Physics) --- Classification according to special characteristics --- 678.07 Classification according to special characteristics --- Diffusion (Physique nucléaire) --- Propriétés optiques --- Computer science. --- Special purpose computers. --- Electronic circuits. --- Computer Science. --- Special Purpose and Application-Based Systems. --- Circuits and Systems. --- Systems and Data Security. --- Polymers --- Scattering (Physics) --- Atomic scattering --- Atoms --- Nuclear scattering --- Particles (Nuclear physics) --- Scattering of particles --- Wave scattering --- Collisions (Nuclear physics) --- Particles --- Collisions (Physics) --- Polymere --- Polymeride --- Polymers and polymerization --- Macromolecules --- Optical properties --- Structure --- Scattering --- fysicochemie --- Electronic circuits --- Microelectronics --- Scattering (Physics). --- Optical properties. --- Structure. --- Polymères --- Software engineering. --- Systems engineering. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Computer software engineering --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Special purpose computers --- Polymers - Structure --- Polymers - Optical properties


Book
Secure integrated circuits and systems.
Author:
ISBN: 9780387718293 9780387565798 9780387718279 9781461425663 9783540565796 3540565795 0387565795 Year: 2010 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security and cryptography needed for such devices from an implementation perspective. The editor provides basic coverage of the mathematics of cryptography, basic security attack strategies, the architecture and implementation options of many security primitives and modules, and design methods for security. Applications covered include security for RFID and sensor nodes, security for FPGAs, smart-cards and flash memories. Secure Integrated Circuits and Systems is a valuable resource for those working on integrated circuits as well as for the embedded systems designer who designs for ASICs, FPGAs and small embedded processors.

Keywords

Electrical engineering --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- hardware --- computerbeveiliging --- elektrische circuits --- Computer security --- Integrated circuits --- Systems on a chip --- 681.3*B7 --- 681.3*B7 Integrated circuits (Hardware) --- Integrated circuits (Hardware) --- SOC design --- Systems on chip --- Embedded computer systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Polymers - Structure --- Polymers - Optical properties --- Scattering (Physics) --- Polymers --- Scattering (Physics). --- Optical properties. --- Structure. --- 678.07 --- 678.07 Classification according to special characteristics --- Classification according to special characteristics --- Atomic scattering --- Atoms --- Nuclear scattering --- Particles (Nuclear physics) --- Scattering of particles --- Wave scattering --- Collisions (Nuclear physics) --- Particles --- Collisions (Physics) --- Polymere --- Polymeride --- Polymers and polymerization --- Macromolecules --- Optical properties --- Structure --- Scattering --- fysicochemie --- POLYMERS --- POLYMER MORPHOLOGY --- FERROELECTRIC MATERIALS --- LIQUID CRYSTALS --- IODINE COMPOUNDS --- ETHENOL, POLYMERS --- PROPERTIES


Digital
Cryptographic Hardware and Embedded Systems - CHES 2007 : 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings
Authors: ---
ISBN: 9783540747352 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Secure Integrated Circuits and Systems
Author:
ISBN: 9780387718293 9780387565798 9780387718279 9781461425663 Year: 2010 Publisher: New York, NY Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security and cryptography needed for such devices from an implementation perspective. The editor provides basic coverage of the mathematics of cryptography, basic security attack strategies, the architecture and implementation options of many security primitives and modules, and design methods for security. Applications covered include security for RFID and sensor nodes, security for FPGAs, smart-cards and flash memories. Secure Integrated Circuits and Systems is a valuable resource for those working on integrated circuits as well as for the embedded systems designer who designs for ASICs, FPGAs and small embedded processors.


Book
Radio Frequency Identification: Security and Privacy Issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
Authors: ---
ISBN: 3642361404 3642361390 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Appl. in Administrative Data Processing. --- e-Commerce/e-business. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Radio frequency identification systems --- Identification systems, Radio frequency --- RF/ID systems --- RFID systems --- Identification --- Radio telemetry --- Near-field communication --- Equipment and supplies --- Information systems. --- Software engineering. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Protection --- Security measures --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing


Book
Lattice-Based Public-Key Cryptography in Hardware
Authors: ---
ISBN: 9813299940 9813299932 Year: 2020 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.


Digital
Radio Frequency Identification. Security and Privacy Issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
Authors: ---
ISBN: 9783642361401 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.


Multi
Lattice-Based Public-Key Cryptography in Hardware
Authors: ---
ISBN: 9789813299948 Year: 2020 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.


Book
Cryptodinges : geheime geschriften en raadsels ontcijferd
Authors: --- ---
ISBN: 9789020978094 Year: 2008 Volume: *2 Publisher: Tielt Lannoo

Loading...
Export citation

Choose an application

Bookmark

Abstract

Wat is cryptografie? Hoe werkte de eerste geheimtaal? Zijn er codes die niemand kan ontcijferen? Wat heeft cryptografie te maken met een gsm of een computer? Hoe kun je zelf een boodschap in geheimschrift schrijven? Wat is cryptografie? Hoe werkte de eerste geheimtaal? Zijn er codes die niemand kan ontcijferen? Wat heeft cryptografie te maken met een gsm of een computer? Hoe kun je zelf een boodschap in geheimschrift schrijven? De K.U.Leuven opende haar deuren voor leergierige kinderen. Ze bestookten de proffen met honderden vragen over wetenschap, geschiedenis, psychologie en nog zoveel meer. Siska Goeminne bundelde de interessantste en leukste vragen over geheime geschriften en codes. Nanne Meulendijks zorgde voor grappige illustraties. Ontdek welke geheimtaal Caesar gebruikte om de vijand om de tuin te leiden en welke rol cryptografie speelt in ons dagelijks leven. (Bron: www.lannoo.be)

Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings
Authors: --- ---
ISBN: 9783540747345 3540747346 3540747354 Year: 2007 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10–13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received plenty of extra reviews (some papers received up to nine reviews), thus totalling the unprecedented record of 483 reviews overall. Thepaperscollectedinthisvolumerepresentcutting-edgeworldwideresearch in the rapidly evolving ?elds of crypto-hardware, fault-based and side-channel cryptanalysis, and embedded cryptography, at the crossing of academic and - dustrial research. The wide diversity of subjects appearing in these proceedings covers virtually all related areas and shows our e?orts to extend the scope of CHES more than usual. Although a relatively young workshop, CHES is now ?rmlyestablishedasascienti?ceventofreferenceappreciatedbymoreandmore renowned experts of theory and practice: many high-quality works were subm- ted, all of which, sadly, could not be accepted. Selecting from so many good worksis no easy task and our deepest thanks go to the members of the Program Committee for their involvement, excellence, and team spirit. We are grateful to the numerous external reviewers listed below for their expertise and assistance in our deliberations.

Keywords

Embedded computer systems --- Cryptography --- Computer security --- Systèmes enfouis (Informatique) --- Cryptographie --- Sécurité informatique --- Congresses. --- Congrès --- Electrical Engineering --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer science. --- Logic design. --- Computer communication systems. --- Special purpose computers. --- Operating systems (Computers). --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Logic Design. --- Operating Systems. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Software engineering. --- Information Systems. --- Cryptology. --- Computer software engineering --- Engineering

Listing 1 - 10 of 131 << page
of 14
>>
Sort by