![VEST / Keccak / Radio-frequency identification / Power analysis / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard VEST / Keccak / Radio-frequency identification / Power analysis / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard](https://www.pdfsearch.io/img/b25ec4680f28151c37010b58678b4a18.jpg)
| Document Date: 2015-01-15 03:13:44 Open Document File Size: 378,50 KBShare Result on Facebook
Company Intel / Embedded Systems / / Currency pence / / / Facility Christoph Ehrenh¨ofer Graz University of Technology / K library / / IndustryTerm deployed systems / performance computing / Wireless Sensor Nodes / low-energy cipher design / low-energy designs / Software implementation / typical applications / industrial applications / above mentioned applications / communication systems / software implementations / low area low energy high throughput / explored algorithm / data processing phase / low energy consumption / cryptographic co-processor / authenticated encryption applications / default solution / certain demanding applications / low-energy microprocessors / typical authenticated encryption applications / energy / / Organization ASIC / EPC / Institute for Applied Information Processing and Communications / Graz University of Technology / / Person Cadence NanoRoute / A SCON / Ai / Erich Wenger / Hannes Groß / Christoph Ehrenh / Christoph Dobraunig / / Position straight-forward / candidate / / Technology encryption / FPGA / cryptography / ASIC / SCON-128 hardware implementations Design Chip / pure algorithms / cryptographic co-processor / SCON algorithm / Radio Frequency / secret key / gigabit / 130 nm low-leakage UMC technology / VHDL / Gigabit Ethernet / / URL http /
SocialTag |