A configurable AES processor for enhanced security.
Chih-Pin SuChia-Lung HorngChih-Tsun HuangCheng-Wen WuPublished in: ASP-DAC (2005)
Keyphrases
- advanced encryption standard
- encryption algorithms
- cryptographic algorithms
- encryption algorithm
- secret key
- encryption decryption
- information security
- security issues
- security level
- access control
- intrusion detection
- security protocols
- security systems
- network security
- security requirements
- key management
- sensitive data
- parallel computing
- statistical databases
- authentication scheme
- security problems
- security threats
- high security
- security policies
- real time