21.8 An actively detuned wireless power receiver with public key cryptographic authentication and dynamic power allocation.
Nachiket V. DesaiChiraag JuvekarShubham ChandakAnantha P. ChandrakasanPublished in: ISSCC (2017)
Keyphrases
- public key
- public key cryptography
- power allocation
- elliptic curve cryptography
- digital signature
- security analysis
- image authentication
- secure communication
- resource allocation
- public key encryption
- authentication scheme
- authentication protocol
- channel state information
- public key infrastructure
- multiple input multiple output
- encryption scheme
- elliptic curve
- private key
- signature scheme
- smart card
- wireless communication
- wireless channels
- mimo systems
- secret key
- identity based encryption
- fading channels
- provably secure
- security services
- ciphertext
- error correction
- hash functions
- power consumption