Login / Signup
Implementing a Protected Zone in a Reconfigurable Processor for Isolated Execution of Cryptographic Algorithms.
Ahmet Onur Durahim
Erkay Savas
Kazim Yumbul
Published in:
ReConFig (2009)
Keyphrases
</>
cryptographic algorithms
data encryption standard
security protocols
elliptic curve cryptography
biometric data
security mechanisms
low cost
security systems