Login / Signup

Implementing a Protected Zone in a Reconfigurable Processor for Isolated Execution of Cryptographic Algorithms.

Ahmet Onur DurahimErkay SavasKazim Yumbul
Published in: ReConFig (2009)
Keyphrases
  • cryptographic algorithms
  • data encryption standard
  • security protocols
  • elliptic curve cryptography
  • biometric data
  • security mechanisms
  • low cost
  • security systems