Recent Trends in Implementing Cryptography with Embedded Microprocessors
نویسندگان
چکیده
منابع مشابه
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors
—In this paper, we revisit the previous multi-precision multiplication techniques including " operand-scanning " , " hybrid-scanning " , " operand-caching " , " consecutive operand-caching " and " product-scanning. " Particularly, the former four methods execute an intermediate result computation which is process for updating the results with a newly computed result by computing a number of add...
متن کاملVector microprocessors for cryptography
Embedded security devices like ‘Trusted Platforms’ require both scalability (of power, performance and area) and flexibility (of software and countermeasures). This thesis illustrates how data parallel techniques can be used to implement scalable architectures for cryptography. Vector processing is used to provide high performance, power efficient and scalable processors. A programmable vector ...
متن کاملImplementing microthreaded microprocessors in VHDL
Micro-threads are small fragments of code based on loops, can be executed concurrently and the concurrency is described parametrically in the binary code. This thesis describes a microthreaded model of concurrency and illustrates the complete bottom-level design of its pipeline compared with the conventional MIPS pipeline. The simulations from a single microthreaded processor implemented in VHD...
متن کاملShared Cryptography with Embedded
In today’s scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared cryptography becomes more popular. Here...
متن کاملRecent Trends in Archaeological Theory: Some Comments
This paper selectively reviews some recent themes in archaeological theory: a philosophical pragmatism, a turn to materiality, and understanding the past in the context of the present. It concludes with some reflective comments on the author’s Archaeological Theory: An Introduction, in advance of the third revised edition.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2013
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2013.23.5.815