Guest Editors' Introduction to Security in Reconfigurable Systems Design

被引:1
|
作者
Schaumont, Patrick R. [3 ]
Jones, Alex K. [1 ]
Trimberger, Steve [2 ]
机构
[1] Univ Pittsburgh, Pittsburgh, PA 15260 USA
[2] Xilinx Inc, San Jose, CA 95124 USA
[3] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
Security; Reliability; Design; Trustworthy design; side-channel resistant design; physically unclonable function; Trojan; ECC;
D O I
10.1145/1502781.1502782
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This special issue on Security in Reconfigurable Systems Design reports on recent research results in the design and implementation of trustworthy reconfigurable systems. Five articles cover topics including power-efficient implementation of public-key cryptography, side-channel analysis of electromagnetic radiation, side-channel resistant design, design of robust unclonable functions on an FPGA, and Trojan detection in an FPGA bitstream.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Guest editors' introduction to security in reconfigurable systems design
    Virginia Polytechnic Institute and State University, Virginia Tech, Whittemore Hall 302, Blacksburg VA 24061, United States
    不详
    不详
    [J]. ACM Trans. Reconfigurable Technol. Syst., 1
  • [2] Privacy and Security by Design Guest Editors' Introduction
    Gedeon, Ibrahim J.
    Snively, Pamela
    Frey, Carey
    Almuhtadi, Wahab
    Mohanty, Saraju P.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 76 - 77
  • [3] Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy
    Maniatakos, Michail
    Karri, Ramesh
    Cardenas, Alvaro A.
    [J]. IEEE DESIGN & TEST, 2017, 34 (04) : 5 - 6
  • [4] Guest Editors' Introduction: Special Issue on Autonomous Systems Design
    Saidi, Selma
    Deshmukh, Jyotirmoy, V
    Ziegenbein, Dirk
    Ernst, Rolf
    [J]. IEEE DESIGN & TEST, 2022, 39 (01) : 5 - 7
  • [5] Co-Design of Business and IT Systems—Introduction by Guest Editors
    Kecheng Liu
    Lily Sun
    Keith Bennett
    [J]. Information Systems Frontiers, 2002, 4 : 251 - 256
  • [6] Co-design of business and IT systems - Introduction by guest editors
    Liu, KC
    Sun, LL
    Bennett, K
    [J]. INFORMATION SYSTEMS FRONTIERS, 2002, 4 (03) : 251 - 256
  • [7] Guest editors’ introduction: practices of security and the political
    Stephan Davidshofer
    Francesco Ragazzi
    [J]. Journal of International Relations and Development, 2007, 10 : 327 - 331
  • [8] Guest editors' introduction: practices of security and the political
    Davidshofer, Stephan
    Ragazzi, Francesco
    [J]. JOURNAL OF INTERNATIONAL RELATIONS AND DEVELOPMENT, 2007, 10 (04) : 327 - 331
  • [9] COMPUTER SECURITY TECHNOLOGY - GUEST EDITORS INTRODUCTION
    AMES, SR
    NEUMANN, PG
    [J]. COMPUTER, 1983, 16 (07) : 10 - 12
  • [10] What kind of security? Guest editors' introduction
    Edgar, Alistair D.
    Ifantis, Kostas
    [J]. INTERNATIONAL JOURNAL, 2007, 62 (03): : 451 - 457