Cryptographic Extension for Soft General-Purpose Processors with Secure Key Management.
Lubos GasparViktor FischerLilian BossuetMilos DrutarovskýPublished in: FPL (2011)
Keyphrases
- key management
- key management scheme
- key distribution
- ad hoc networks
- security protocols
- wireless sensor networks
- resource constrained
- digital signature
- general purpose processors
- secret sharing scheme
- secret key
- secure communication
- provably secure
- group communication
- identity based cryptography
- authentication scheme
- security services
- smart card
- hardware implementation
- key establishment
- elliptic curve
- data flow
- wireless networks
- source code
- response time
- general purpose
- database systems
- image processing