License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.6.8.65
URN: urn:nbn:de:0030-drops-68387
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2017/6838/
Batina, Lejla ;
Bhunia, Swarup ;
Schaumont, Patrick ;
Seifert, Jean-Pierre
Weitere Beteiligte (Hrsg. etc.): Lejla Batina and Swarup Bhunia and Patrick Schaumont and Jean-Pierre Seifert
Foundations of Secure Scaling (Dagstuhl Seminar 16342)
Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16342 "Foundations of Secure Scaling". This seminar hosted researchers in secure electronic system design, spanning all abstraction levels from cryptographic engineering over chip design to system integration. We recognize that scaling is a fundamental force present at every abstraction level in electronic system design. While scaling is generally thought of as beneficial to the resulting implementations, this does not hold for secure electronic design. Indeed, the relations between scaling and the resulting security are poorly understood. This seminar facilitated the discussion between security experts at different abstraction levels in order to uncover the links between scaling and the resulting security.
BibTeX - Entry
@Article{batina_et_al:DR:2017:6838,
author = {Lejla Batina and Swarup Bhunia and Patrick Schaumont and Jean-Pierre Seifert},
title = {{Foundations of Secure Scaling (Dagstuhl Seminar 16342)}},
pages = {65--90},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2017},
volume = {6},
number = {8},
editor = {Lejla Batina and Swarup Bhunia and Patrick Schaumont and Jean-Pierre Seifert},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
address = {Dagstuhl, Germany},
URL = {http://drops.dagstuhl.de/opus/volltexte/2017/6838},
URN = {urn:nbn:de:0030-drops-68387},
doi = {10.4230/DagRep.6.8.65},
annote = {Keywords: Cryptographic Engineering, Very Large Scale Integration, Secure Hardware Design, Technology Scaling, Complexity Scaling, Secure Evaluation}
}
Keywords: |
|
Cryptographic Engineering, Very Large Scale Integration, Secure Hardware Design, Technology Scaling, Complexity Scaling, Secure Evaluation |
Collection: |
|
Dagstuhl Reports, Volume 6, Issue 8 |
Issue Date: |
|
2017 |
Date of publication: |
|
04.01.2017 |