How Secure Are FPGAs in Cryptographic Applications?
Thomas J. WollingerChristof PaarPublished in: FPL (2003)
Keyphrases
- key management
- security protocols
- encryption key
- cryptographic protocols
- public key encryption
- digital signature
- encryption scheme
- secure communication
- security properties
- smart card
- cryptographic algorithms
- stream cipher
- security requirements
- security analysis
- security mechanisms
- public key cryptography
- advanced encryption standard
- resource constrained
- field programmable gate array
- key distribution
- ad hoc networks
- security services
- homomorphic encryption
- covert channel
- encryption decryption
- embedded systems
- authentication scheme
- security issues
- signature scheme
- public key
- hardware software
- block cipher
- standard model
- wireless sensor networks