Security-Driven Exploration of Cryptography in DSP Cores.
Catherine H. GebotysPublished in: ISSS (2002)
Keyphrases
- information security
- encryption algorithms
- security issues
- signal processing
- network security
- security level
- security systems
- intrusion detection
- cellular automata
- cryptographic algorithms
- digital signal processing
- computer security
- elliptic curve cryptography
- high speed
- security requirements
- public key cryptography
- digital signal processor
- smart card
- security policies
- security mechanisms
- information systems
- data integrity
- security model
- data driven
- public key
- security services
- security analysis
- sensitive data
- biometric systems
- access control
- low cost