How Secure Are FPGAs in Cryptographic Applications?
Thomas J. WollingerChristof PaarPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- security protocols
- key management
- cryptographic protocols
- encryption key
- public key encryption
- security properties
- secure communication
- encryption scheme
- smart card
- digital signature
- stream cipher
- cryptographic algorithms
- advanced encryption standard
- security requirements
- authentication scheme
- public key cryptography
- encryption decryption
- block cipher
- hardware software
- security mechanisms
- authentication protocol
- data security
- lightweight
- hardware implementation
- field programmable gate array
- key distribution
- elliptic curve cryptography
- homomorphic encryption
- image processing
- data encryption
- security services
- standard model
- ad hoc networks
- secret key