High-speed hardware architectures for authenticated encryption mode GCM.
Akashi SatohPublished in: ISCAS (2006)
Keyphrases
- hardware architectures
- high speed
- key exchange
- computational power
- hardware architecture
- security analysis
- low power
- image encryption
- key exchange protocol
- encryption algorithms
- authentication scheme
- digital signature
- real time
- key distribution
- key management
- encryption algorithm
- encryption scheme
- high speed networks
- secure communication
- diffie hellman
- secret key
- software development
- low cost
- software engineering