Secure cryptographic hardware implementation issues for high-performance applications.
Erica Tena-SánchezAntonio J. AcostaJuan NúñezPublished in: PATMOS (2016)
Keyphrases
- implementation issues
- advanced encryption standard
- encryption key
- key management
- protection schemes
- security protocols
- cryptographic protocols
- public key encryption
- random number generator
- smart card
- low cost
- cryptographic algorithms
- secure communication
- scientific computing
- digital signature
- encryption scheme
- security properties
- embedded processors
- hardware and software
- low latency
- real time
- signal processor
- stream cipher
- hardware implementation
- authentication scheme
- security requirements
- s box
- low power consumption
- security analysis
- graphics processing units
- security mechanisms
- sensitive data
- signal processing
- operating system
- ad hoc networks
- data encryption
- computing systems
- public key cryptography
- trusted computing
- hash functions
- hardware architecture
- random number
- authentication protocol
- security level
- homomorphic encryption
- application level
- single chip