Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers.
Amr AbbasHassan MostafaAhmed Nader MohieldinPublished in: J. Low Power Electron. (2019)
Keyphrases
- low power
- key exchange
- key exchange protocol
- key agreement protocol
- power consumption
- low cost
- high speed
- advanced encryption standard
- authentication scheme
- diffie hellman
- security analysis
- key distribution
- cmos technology
- image encryption
- low power consumption
- stream cipher
- vlsi architecture
- password based authenticated key exchange
- key management
- encryption algorithms
- single chip
- secret key
- signal processor
- high security
- encryption scheme
- logic circuits
- vlsi circuits
- security properties
- private key
- ultra low power
- gate array
- elliptic curve
- secure communication
- image sensor
- hash functions
- encryption algorithm
- smart card
- authentication protocol
- hardware implementation
- digital signal processing
- power reduction
- public key
- real time
- vlsi implementation