Secure AES Hardware Module for Resource Constrained Devices.
Elena TrichinaTymur KorkishkoPublished in: ESAS (2004)
Keyphrases
- resource constrained
- embedded systems
- security mechanisms
- advanced encryption standard
- key management
- cryptographic algorithms
- low cost
- wireless sensor networks
- sensor networks
- resource limitations
- resource constraints
- rfid tags
- encryption algorithms
- security protocols
- block cipher
- real time
- software systems
- key distribution
- hardware implementation
- private key
- fault model
- multipath
- s box
- end to end
- data collection
- search space
- video sequences
- data sets