A tamper-resistant electronic circuit is configured for implementation in a device. The electronic circuit securely implements and utilizes device-specific security data during operation in the device, and is basically provided with a tamper-resistantly stored secret not accessible over an external circuit interface. The electronic circuit is also provided with functionality for performing cryptographic processing at least partly in response to the stored secret to generate an instance of device-specific security data that is internally confined within said electronic circuit during usage of the device. The electronic circuit is further configured for performing one or more security-related operations or algorithms in response to the intern...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
The problem of information leakage through electromagnetic waves for various devices has been extens...
This paper presents an overview of a mobile communications device that implements a key management p...
The invention relates to a method for handling data (A, B) between two memory areas (W, R1, R2) of a...
We provide an overview of selected crypto-hardware devices, with a special reference to the lightwei...
Techniques are able to lock and unlock and integrated circuit (IC) based device by encrypting/decryp...
A method of protecting an electronic device from unauthorized reprogramming, the electronic device c...
A method of authorising the operation of an electronic device and particularly an electronic communi...
Abstract. Motivated by the problem of protecting cryptographic hard-ware, we continue the investigat...
<i>A device designed for protection of premises against unauthorized hacking which is characterized ...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
DE 19843424 A UPAB: 20000524 NOVELTY - The device includes an electronic circuit (16) for producing ...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
An electronic device requires valid control keys to change any usage restriction setting. The device...
Abstract. Side channel and fault attacks take advantage from the fact that the behavior of crypto im...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
The problem of information leakage through electromagnetic waves for various devices has been extens...
This paper presents an overview of a mobile communications device that implements a key management p...
The invention relates to a method for handling data (A, B) between two memory areas (W, R1, R2) of a...
We provide an overview of selected crypto-hardware devices, with a special reference to the lightwei...
Techniques are able to lock and unlock and integrated circuit (IC) based device by encrypting/decryp...
A method of protecting an electronic device from unauthorized reprogramming, the electronic device c...
A method of authorising the operation of an electronic device and particularly an electronic communi...
Abstract. Motivated by the problem of protecting cryptographic hard-ware, we continue the investigat...
<i>A device designed for protection of premises against unauthorized hacking which is characterized ...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
DE 19843424 A UPAB: 20000524 NOVELTY - The device includes an electronic circuit (16) for producing ...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
An electronic device requires valid control keys to change any usage restriction setting. The device...
Abstract. Side channel and fault attacks take advantage from the fact that the behavior of crypto im...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
The problem of information leakage through electromagnetic waves for various devices has been extens...
This paper presents an overview of a mobile communications device that implements a key management p...