High Throughput and Secure Authentication-Encryption on Asynchronous Multicore Processor for Edge Computing IoT Applications.
Weng-Geng HoAli Akbar PammuNe Kyaw Zwa LwinKwen-Siong ChongBah-Hwee GweePublished in: ISOCC (2020)
Keyphrases
- high throughput
- data encryption
- key management
- integrity verification
- encryption decryption
- security analysis
- public key cryptography
- key distribution
- microarray
- authentication scheme
- genome wide
- authentication protocol
- secret key
- systems biology
- biological data
- public key
- secure communication
- mutual authentication
- security services
- key exchange
- private key
- encryption scheme
- digital signature
- user authentication
- cell processor
- image authentication
- elliptic curve cryptography
- security requirements
- data acquisition
- dna sequencing
- mass spectrometry data
- security properties
- security mechanisms
- protein protein interactions
- data security
- high speed
- provably secure
- genomic data
- proteomic data
- multicore processors
- mass spectrometry
- cryptographic protocols
- wireless sensor networks
- smart card
- cloud computing
- security protocols
- diffie hellman
- low latency
- encryption algorithm
- elliptic curve
- real time