Design and implementation of a private and public key crypto processor and its application to a security system.
Ho Won KimSunggu LeePublished in: IEEE Trans. Consumer Electron. (2004)
Keyphrases
- public key
- private key
- security analysis
- digital signature
- public key cryptosystem
- security model
- public key encryption scheme
- public key cryptography
- homomorphic encryption
- elliptic curve cryptography
- smart card
- authentication scheme
- secure communication
- data integrity
- access control
- rfid tags
- image authentication
- blind signature scheme
- real time
- security mechanisms
- public key infrastructure
- provably secure
- diffie hellman
- software architecture
- authentication protocol
- security protocols
- security requirements