{"title":"赫克托耳","authors":"Hector Kinderakademien","doi":"10.1093/benz/9780199773787.article.b00085161","DOIUrl":null,"url":null,"abstract":"graphic algorithms and their efficient, secure and robust hardware implementations. The consortium aims for a stronger European knowledge integration through collaboration among key complementary European security technology and value chain actors, in order to fully unleash and leverage Europe’s security innovation, competitiveness, and leadership potential. A single flipped bit or a weak random number generator can cause secure systems to fail. Therefore, the main motivation of this project is to bridge basic algorithmic approaches with hardware-level security implementations. It requires integrating secure cryptographic primitives such as random number generators (RNGs) and physically uncloneable functions (PUFs), together with physical attack countermeasures. The goal is to study, design and implement RNGs and PUFs with demonstrable entropy guarantees and quality metrics. This includes on-the-fly entropy testing and physical attacks evaluations, which will enable more secure systems and easier certification.","PeriodicalId":365335,"journal":{"name":"On the Iliad","volume":"105 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Hector\",\"authors\":\"Hector Kinderakademien\",\"doi\":\"10.1093/benz/9780199773787.article.b00085161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"graphic algorithms and their efficient, secure and robust hardware implementations. The consortium aims for a stronger European knowledge integration through collaboration among key complementary European security technology and value chain actors, in order to fully unleash and leverage Europe’s security innovation, competitiveness, and leadership potential. A single flipped bit or a weak random number generator can cause secure systems to fail. Therefore, the main motivation of this project is to bridge basic algorithmic approaches with hardware-level security implementations. It requires integrating secure cryptographic primitives such as random number generators (RNGs) and physically uncloneable functions (PUFs), together with physical attack countermeasures. The goal is to study, design and implement RNGs and PUFs with demonstrable entropy guarantees and quality metrics. This includes on-the-fly entropy testing and physical attacks evaluations, which will enable more secure systems and easier certification.\",\"PeriodicalId\":365335,\"journal\":{\"name\":\"On the Iliad\",\"volume\":\"105 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"On the Iliad\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/benz/9780199773787.article.b00085161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"On the Iliad","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/benz/9780199773787.article.b00085161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
graphic algorithms and their efficient, secure and robust hardware implementations. The consortium aims for a stronger European knowledge integration through collaboration among key complementary European security technology and value chain actors, in order to fully unleash and leverage Europe’s security innovation, competitiveness, and leadership potential. A single flipped bit or a weak random number generator can cause secure systems to fail. Therefore, the main motivation of this project is to bridge basic algorithmic approaches with hardware-level security implementations. It requires integrating secure cryptographic primitives such as random number generators (RNGs) and physically uncloneable functions (PUFs), together with physical attack countermeasures. The goal is to study, design and implement RNGs and PUFs with demonstrable entropy guarantees and quality metrics. This includes on-the-fly entropy testing and physical attacks evaluations, which will enable more secure systems and easier certification.