Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography.
Sean O'MeliaAdam J. ElbirtPublished in: ACSAC (2008)
Keyphrases
- symmetric key
- instruction set
- security analysis
- key management
- instruction set architecture
- security requirements
- security protocols
- data protection
- secret key
- floating point
- encryption scheme
- public key cryptography
- public key
- security mechanisms
- application specific
- encryption algorithm
- resource constrained
- smart card
- embedded systems
- diffie hellman
- computer architecture
- security model
- digital signature
- ad hoc networks
- wireless sensor networks
- fixed point
- security services
- efficient implementation
- low cost
- general purpose
- information systems
- access control
- memory access
- data management
- provably secure