The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security.
Jed Kao-Tung ChangShaoshan LiuJean-Luc GaudiotChen LiuPublished in: PRDC (2010)
Keyphrases
- security protocols
- advanced encryption standard
- random number generator
- information security
- security mechanisms
- low cost
- private key
- access control
- hardware and software
- real time
- security policies
- network security
- computing systems
- security analysis
- parallel computation
- embedded systems
- security issues
- protection scheme
- hardware implementation
- rfid systems
- security requirements
- encryption algorithms
- intrusion detection
- cryptographic algorithms
- security systems
- security problems
- public key
- windows xp
- trusted computing
- computer systems
- security level
- data security
- vlsi implementation
- s box
- data integrity
- rfid tags
- statistical databases