Subthreshold SRAM Designs for Cryptography Security Computations.
Adnan Abdul-Aziz GutubPublished in: ICSECS (1) (2011)
Keyphrases
- information security
- encryption algorithms
- cellular automata
- power consumption
- security issues
- public key cryptography
- elliptic curve cryptography
- cryptographic algorithms
- access control
- intrusion detection
- network security
- security policies
- cryptographic protocols
- low power
- information systems
- security requirements
- security level
- statistical databases
- encryption scheme
- high security