Storage and computation optimization of public-key schemes on embedded devices.
Jori WinderickxAn BraekenNele MentensPublished in: Cloudtech (2018)
Keyphrases
- public key
- embedded devices
- data storage
- provably secure
- public key encryption
- security analysis
- mobile devices
- embedded systems
- digital signature
- image authentication
- security model
- public key cryptography
- signature scheme
- limited memory
- flash memory
- rfid tags
- blind signature
- elliptic curve cryptography
- secret key
- proxy re encryption
- signcryption scheme
- private key
- lightweight
- database management systems
- influence diagrams
- database
- diffie hellman
- mobile commerce
- ciphertext
- security protocols
- file system
- random access