Boundary Scan Security Enhancements for a Cryptographic Hardware.
Maciej NikodemPublished in: EUROCAST (2009)
Keyphrases
- random number generator
- security protocols
- key management
- security properties
- protection schemes
- security requirements
- random number
- smart card
- advanced encryption standard
- encryption scheme
- encryption decryption
- access control
- cryptographic protocols
- secure communication
- cryptographic algorithms
- high assurance
- low cost
- real time
- security policies
- computer systems
- information security
- network security
- trusted computing
- fuzzy vault
- encryption key
- hardware and software
- stream cipher
- hardware implementation
- security issues
- security analysis
- security services
- computing systems
- elliptic curve cryptography
- security model
- security level
- object boundaries
- security systems
- data security
- security mechanisms
- data integrity