![Embedded system / Physical Unclonable Function / Trusted Computing / Key generation / Cyberwarfare / Computer security / Electronic engineering / SiliconBlue Technologies / Secure cryptoprocessor / Cryptography / Key management / Field-programmable gate array Embedded system / Physical Unclonable Function / Trusted Computing / Key generation / Cyberwarfare / Computer security / Electronic engineering / SiliconBlue Technologies / Secure cryptoprocessor / Cryptography / Key management / Field-programmable gate array](https://www.pdfsearch.io/img/e18562cbec27c315882eade9d7250b59.jpg)
| Document Date: 2007-04-09 15:36:30 Open Document File Size: 244,46 KBShare Result on Facebook
Company AES / / / / IndustryTerm direct communications / secure environment using adaptive hardware / adaptive hardware / covert communications channels / symmetric key applications / secret key algorithms / software co-design / given chip / given device / cryptography algorithms / energy consumption difference / encryption energy consumption difference / secure hash algorithm / secure co-processors / secure computing environment / trusted computing base / desktop systems / secure mobile computing environment / public key algorithms / generation server / energy / / Organization Department of Electrical and Computer Engineering Clemson University Clemson / / Person S. T. Sander / / / Position embedded interpreter / Assistant professor / Associate Professor / interpreter / / Product Encryptor 142.349 MHz 2661 1.822 Gbps 11 / Decryptor 124.332 MHz 3364 1.591 Gbps 14 / / Technology encryption / FPGA / cryptography / PKI technology / public key / public key algorithms / 2 algorithms / secure co-processors / hardened processor / mobile computing / secure hash algorithm / digital signature / Symmetric key algorithms / given chip / cryptography algorithms / secret key algorithms / /
SocialTag |