Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications.
Andrea HöllerNorbert DrumlChristian KreinerChristian StegerTomaz FelicijanPublished in: DAC (2014)
Keyphrases
- resource constrained
- elliptic curve cryptography
- hardware software co design
- hardware and software
- elliptic curve
- key management
- hw sw
- authentication scheme
- public key
- embedded systems
- security analysis
- wireless sensor networks
- resource constraints
- sensor networks
- field programmable gate array
- high security
- error correction
- security mechanisms
- digital watermark
- rfid tags
- low cost
- smart card
- public key cryptography
- computer systems
- hardware software
- multipath
- sensor data
- image processing