Embedded Computing Systems (TECS)


Search Issue
enter search term and/or author name


ACM Transactions on Embedded Computing Systems (TECS), Volume 3 Issue 3, August 2004

Guest editorial: Special issue on embedded systems and security
Dimitrios N. Serpanos, Haris Lekatsas
Pages: 459-460
DOI: 10.1145/1015047.1015048

Security in embedded systems: Design challenges
Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady
Pages: 461-491
DOI: 10.1145/1015047.1015049
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious...

Statistics and secret leakage
Jean-Sebastien Coron, David Naccache, Paul Kocher
Pages: 492-508
DOI: 10.1145/1015047.1015050
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different...

Elliptic and hyperelliptic curves on embedded μP
Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin K. Koç
Pages: 509-533
DOI: 10.1145/1015047.1015051
It is widely recognized that data security will play a central role in future IT systems. Providing public-key cryptographic primitives, which are the core tools for security, is often difficult on embedded processor due to computational, memory, and...

Security on FPGAs: State-of-the-art implementations and attacks
Thomas Wollinger, Jorge Guajardo, Christof Paar
Pages: 534-574
DOI: 10.1145/1015047.1015052
In the last decade, it has become apparent that embedded systems are integral parts of our every day lives. The wireless nature of many embedded applications as well as their omnipresence has made the need for security and privacy preserving...

Efficient digit-serial normal basis multipliers over binary extension fields
Arash Reyhani-Masoleh, M. Anwar Hasan
Pages: 575-592
DOI: 10.1145/1015047.1015053
In this article, two digit-serial architectures for normal basis multipliers over (GF(2m)) are presented. These two structures have the same gate count and gate delay. We also consider two special cases of optimal normal bases for the...

Towards fault-tolerant cryptographic computations over finite fields
Arash Reyhani-Masoleh, M. Anwar Hasan
Pages: 593-613
DOI: 10.1145/1015047.1015054
Cryptographic schemes, such as authentication, confidentiality, and integrity, rely on computations in very large finite fields, whose hardware realization may require millions of logic gates. In a straightforward design, even a single fault in such...

A fast string-matching algorithm for network processor-based intrusion detection system
Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao
Pages: 614-633
DOI: 10.1145/1015047.1015055
Network intrusion detection systems (NIDSs) are one of the latest developments in security. The matching of packet strings against collected signatures dominates signature-based NIDS performance. Network processors are also one of the fastest growing...

LiSP: A lightweight security protocol for wireless sensor networks
Taejoon Park, Kang G. Shin
Pages: 634-660
DOI: 10.1145/1015047.1015056
Small low-cost sensor devices with limited resources are being used widely to build a self-organizing wireless network for various applications, such as situation monitoring and asset surveillance. Making such a sensor network secure is crucial to...