Secure extensions of FPGA soft core processors for symmetric key cryptography.
Lubos GasparViktor FischerLilian BossuetRobert FouquetPublished in: ReCoSoC (2011)
Keyphrases
- symmetric key
- key management
- security analysis
- diffie hellman
- security requirements
- encryption scheme
- security protocols
- public key cryptography
- public key
- key establishment
- security mechanisms
- secret key
- secure communication
- encryption algorithm
- data protection
- resource constrained
- security properties
- smart card
- provably secure
- ad hoc networks
- secret sharing scheme
- wireless sensor networks
- standard model
- elliptic curve
- security model
- security services
- group communication
- low cost
- digital signature
- access control
- data security
- cryptographic protocols
- authentication protocol
- parallel computing
- security policies
- efficient implementation
- computer systems