Login / Signup

ASIC-oriented comparative review of hardware security algorithms for internet of things applications.

Mohamed A. BahnasawiKhalid IbrahimAhmed MohamedMohamed Khalifa MohamedAhmed MoustafaKareem AbdelmonemYehea IsmailHassan Mostafa
Published in: ICM (2016)
Keyphrases
  • computational cost
  • low cost
  • hardware implementation
  • hardware architecture
  • data mining techniques
  • computationally efficient
  • theoretical analysis
  • data structure
  • security policies
  • security requirements