2015
DOI: 10.1109/tce.2015.7389805
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of a hardware security chip for mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Developing methods to combat these new challenges has drawn interest from a number of researchers. This has included classical approaches such as designing hardware security chips for mobile devices [18] and secure firmware validation and update schemes for personal home devices [8]. Other areas of interest include security architecture for edge devices [33] and protecting the runtime data of embedded systems through hardware-enhanced cryptographic engines including AES and the hashing algorithm LHash [35].…”
Section: Prior Related Work On Consumer Electronics Securitymentioning
confidence: 99%
“…Developing methods to combat these new challenges has drawn interest from a number of researchers. This has included classical approaches such as designing hardware security chips for mobile devices [18] and secure firmware validation and update schemes for personal home devices [8]. Other areas of interest include security architecture for edge devices [33] and protecting the runtime data of embedded systems through hardware-enhanced cryptographic engines including AES and the hashing algorithm LHash [35].…”
Section: Prior Related Work On Consumer Electronics Securitymentioning
confidence: 99%
“…IoT devices also face major challenges in the form of security. Two major areas of concern are authentication and access control [13,21]. The non-volatile memories used to store secret keys have been shown to be vulnerable to active attacks [3,16].…”
Section: Introductionmentioning
confidence: 99%