Low Power Consumption Security Platform for Industrial Communications using an MPSoC
暂无分享,去创建一个
José M. Chaves-González | Miguel A. Vega-Rodríguez | Juan Antonio Gómez Pulido | Juan M. Sánchez-Pérez | José M. Granado Criado | J. M. Chaves-González | M. A. Vega-Rodríguez | J. M. Sánchez-Pérez | J. Pulido | J. Criado
[1] Joos Vandewalle,et al. Hardware architectures for public key cryptography , 2003, Integr..
[2] Deian Stefan,et al. Fast Software AES Encryption , 2010, FSE.
[3] A. Treytl,et al. Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..
[4] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[5] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[6] Philip Koopman. Embedded System Security , 2004, Computer.
[7] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[8] Yu-Kumg Chen,et al. The fastest carry lookahead adder , 2004, Proceedings. DELTA 2004. Second IEEE International Workshop on Electronic Design, Test and Applications.
[9] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[10] Vincent Rijmen,et al. The Block Cipher Rijndael , 1998, CARDIS.
[11] Mehdi B. Tahoori,et al. An Analytical Approach for Soft Error Rate Estimation of SRAM-Based FPGAs , 2004 .
[12] Pierre Laurent,et al. Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions , 2011, IEEE Transactions on Computers.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] E. Normand. Single event upset at ground level , 1996 .
[15] Armando Astarloa,et al. I2CSec: A secure serial Chip-to-Chip communication protocol , 2011, J. Syst. Archit..
[16] Lein Harn,et al. Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.