2015
DOI: 10.3390/electronics4040763
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Hardware Security

Abstract: Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both aca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(23 citation statements)
references
References 116 publications
0
23
0
Order By: Relevance
“…Due to these reasons, a technology that provides mechanisms to verify accountability and to add trust is required. Moreover, note that since trust into the collected values would be needed to replace trusted third parties [11], additional security mechanisms should be implemented, especially at a hardware level [12]. • The data exchanged with third companies is key for some businesses, so they should be protected and anonymized.…”
Section: Introductionmentioning
confidence: 99%
“…Due to these reasons, a technology that provides mechanisms to verify accountability and to add trust is required. Moreover, note that since trust into the collected values would be needed to replace trusted third parties [11], additional security mechanisms should be implemented, especially at a hardware level [12]. • The data exchanged with third companies is key for some businesses, so they should be protected and anonymized.…”
Section: Introductionmentioning
confidence: 99%
“…In [9], the authors provided a study on using software engineering for evaluating the security risks including identification system in humans using some image features that need software engineering for producing the reliable codes. In [10], a complete study for hardware security was introduced. This study included key points of using the techniques of software engineering in the key generation and management.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the large number of encryption algorithms proposed in previous decades, there is still a great interest in the field of cryptography [1,2]. This is mainly for two reasons: first, due to the growth of computer processing power as well as developments in the field of cryptanalysis, many of the previously proposed algorithms are currently considered to be insecure; second, new applications that require specific constraints such as low power consumption can require specific encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%