dc.contributor.author | Σκλάβος, Νικόλαος | el |
dc.contributor.author | Τούλιου, Κ. | el |
dc.contributor.author | Ευσταθίου, Κωνσταντίνος Η. | el |
dc.date.accessioned | 2015-03-17T11:26:49Z | |
dc.date.available | 2015-03-17T11:26:49Z | |
dc.date.issued | 2015-03-17 | |
dc.identifier.uri | http://hdl.handle.net/11400/8096 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://www.wseas.us/e-library/conferences/2006prague/papers/513-177.pdf | el |
dc.subject | Reverse engineering | |
dc.subject | Random number generators | |
dc.subject | Software - hardware cryptographic implementations | |
dc.subject | Λογισμικό - κρυπτογραφικές εφαρμογές | |
dc.subject | Memory access | |
dc.subject | Πρόσβαση στη μνήμη | |
dc.subject | Αντίστροφη μηχανική | |
dc.subject | Timing and power analysis attacks | |
dc.subject | OS vulnerabilities | |
dc.subject | Τρωτά σημεία OS | |
dc.subject | Γεννήτριες τυχαίων αριθμών | |
dc.subject | Key storage | |
dc.subject | Βασική αποθήκευση | |
dc.title | Exploiting cryptographic architectures over hardware vs. software implementations | en |
heal.type | conferenceItem | |
heal.secondaryTitle | advantages and trade-offs | en |
heal.classification | Computer science | |
heal.classification | Computer programming | |
heal.classification | Πληροφορική | |
heal.classification | Προγραμματισμός | |
heal.classificationURI | http://data.seab.gr/concepts/77de68daecd823babbb58edb1c8e14d7106e83bb | |
heal.classificationURI | http://skos.um.es/unescothes/C00749 | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.classificationURI | **N/A**-Προγραμματισμός | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh93004214 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh85111351 | |
heal.language | en | |
heal.access | free | |
heal.recordProvider | Τεχνολογικό Εκπαιδευτικό Ίδρυμα Αθήνας.Σχολή Τεχνολογικών Εφαρμογών.Τμήμα Μηχανικών Πληροφορικής | el |
heal.publicationDate | 2006-03 | |
heal.bibliographicCitation | Sklavos, N., Touliou, K. & Efstathiou, C. (2006) Exploiting cryptographic architectures over hardware vs. software implementations: advantages and trade-offs. 5th International Conference on Applications of Electrical Engineering(AEE ‘06), Prague, Czech Republic, March 12-14, 2006. | en |
heal.abstract | Cryptographic modules can be implemented in both hardware and software. Although software cryptographic implementations are cost-effective and more flexible, they seem to provide a much lower level of security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilities imposed by the OS and the facility of modifying software implementations are some of the security barriers of software cryptographic modules. This works deals with the exploitation of security architectures via software and hardware implementations. Especially it is centers in the advantages and the trade-offs of each one of the two alternatives integration approaches. | en |
heal.fullTextAvailability | false | |
heal.conferenceName | 5th International Conference on Applications of Electrical Engineering(AEE ‘06), | en |
heal.conferenceItemType | full paper |
Αρχεία | Μέγεθος | Μορφότυπο | Προβολή |
---|---|---|---|
Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο. |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: