Secure Hardware and Cryptography: Contrasts, Synergies and Challenges.
Srinivas DevadasPublished in: ASHES@CCS (2017)
Keyphrases
- lessons learned
- low cost
- cellular automata
- hardware implementation
- cryptographic protocols
- computer systems
- key issues
- personal computer
- security issues
- hardware and software
- advanced encryption standard
- image processing
- real time
- encryption algorithms
- cryptographic algorithms
- vlsi implementation
- open issues
- security requirements
- mobile handheld devices
- application level
- security mechanisms
- encryption scheme
- resource constrained
- computing power
- computing systems
- real world