| Document Date: 2007-04-09 15:36:30 Open Document File Size: 244,46 KBShare Result on Facebook
Company AES / / / / IndustryTerm direct communications / secure environment using adaptive hardware / adaptive hardware / covert communications channels / symmetric key applications / secret key algorithms / software co-design / given chip / given device / cryptography algorithms / energy consumption difference / encryption energy consumption difference / secure hash algorithm / secure co-processors / secure computing environment / trusted computing base / desktop systems / secure mobile computing environment / public key algorithms / generation server / energy / / Organization Department of Electrical and Computer Engineering Clemson University Clemson / / Person S. T. Sander / / / Position embedded interpreter / Assistant professor / Associate Professor / interpreter / / Product Encryptor 142.349 MHz 2661 1.822 Gbps 11 / Decryptor 124.332 MHz 3364 1.591 Gbps 14 / / Technology encryption / FPGA / cryptography / PKI technology / public key / public key algorithms / 2 algorithms / secure co-processors / hardened processor / mobile computing / secure hash algorithm / digital signature / Symmetric key algorithms / given chip / cryptography algorithms / secret key algorithms / /
SocialTag |