A New Design of Low Cost Security Coprocessor for Portable Electronic Devices
暂无分享,去创建一个
Zuying Luo | Dan Su | Yuan Jiang | Yongjun Xu | Chao Li | Dan Su | Yongjun Xu | Chao Li | Yuan Jiang | Zuying Luo
[1] Tomoaki Sato,et al. Hardware/Software Co-design of a Secure Ubiquitous System , 2006, 2006 International Conference on Computational Intelligence and Security.
[2] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[3] Sunggu Lee,et al. Design and implementation of a private and public key crypto processor and its application to a security system , 2004, IEEE Trans. Consumer Electron..
[4] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[5] Manfred Glesner,et al. Design of a reconfigurable AES encryption/decryption engine for mobile terminals , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[6] Ing-Jer Huang,et al. On-Chip-Network cryptosystem: A high throughput and high security architecture , 2008, APCCAS 2008 - 2008 IEEE Asia Pacific Conference on Circuits and Systems.
[7] Shi-Yu Huang,et al. A network security processor design based on an integrated SOC design and test platform , 2006, 2006 43rd ACM/IEEE Design Automation Conference.
[8] Alex Biryukov,et al. Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.
[9] Xiaoyang Zeng,et al. A multi-task-oriented security processing architecture with powerful extensibility , 2009, 2009 Asia and South Pacific Design Automation Conference.
[10] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[11] Qing Li,et al. A low-cost cryptographic processor for security embedded system , 2008, 2008 Asia and South Pacific Design Automation Conference.
[12] Wolfgang Bauer. Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.
[13] Hongyi Chen,et al. Zodiac: System architecture implementation for a high-performance Network Security Processor , 2008, ASAP.
[14] Chen Hongyi,et al. Zodiac: System architecture implementation for a high-performance Network Security Processor , 2008, 2008 International Conference on Application-Specific Systems, Architectures and Processors.
[15] Ingrid Verbauwhede,et al. High-throughput programmable cryptocoprocessor , 2004, IEEE Micro.
[16] Domenico Cotroneo,et al. How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[17] Jun Han,et al. A programmable security processor for cryptography algorithms , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.
[18] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[19] P. Glenn Gulak,et al. An area-efficient universal cryptography processor for smart cards , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[20] Keshab K. Parhi,et al. Implementation approaches for the Advanced Encryption Standard algorithm , 2002 .