搜索结果: 1-14 共查到“军事学 s Area”相关记录14条 . 查询时间(0.39 秒)
Physical Layer Group Key Agreement for Automotive Controller Area Networks
Automotive security ECU keys CAN bus
2016/6/8
Distribution of cryptographic keys between devices communicating over a publicly accessible medium is an important component of secure design for networked systems. In this paper, we consider the prob...
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
Public-Key crypto-systems higher-radix
2016/1/27
Modular multiplication is the fundamental and compute-intense operation in many Public-Key crypto-systems. This paper presents two modular multipliers with their efficient architectures based on Booth...
Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Elliptic Curves Cryptosystems(ECC) RSA ASIC
2016/1/27
The strength of ECC lies in the hardness of elliptic curve
discrete logarithm problem (ECDLP) and the hight level security with
significantly smaller keys. Thus, using smaller key sizes is a gain in...
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Block Ciphers Light-Weight Cryptography
2016/1/23
While AES is extensively in use in a number of applications, its area cost limits its deployment in resource constrained platforms. In this paper, we have implemented SIMON, a recent promising low-c...
A Low-Latency, Low-Area Hardware Oblivious RAM Controller
oblivous ram Path ORAM secure processors
2016/1/9
We build and evaluate Tiny ORAM, an Oblivious RAM prototype on FPGA. Oblivious RAM is a cryptographic primitive that completely obfuscates an application's data, access pattern and read/write behavior...
W-SPS: Designing a Wide-Area Secure Positioning System
location-based services location verification privacy
2016/1/3
Motivated by the security and functional limitations of satellite positioning systems, we explore a design of a Wide-Area Secure Positioning System. The main goals of this system are strong spoofing r...
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves
BN curves Optimal Ate Pairing Final Exponentiation
2015/12/21
To have an efficient asymmetric key encryption scheme, such as elliptic
curves, hyperelliptic curves, pairing ... etc we have to go through
arithmetic optimization then hardware optimization. Regard...
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
hardware implementation energy
2014/3/6
In this paper we perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. We do this...
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
implementation / AES ECHO hash functions implementation SHA-3
2012/3/29
We propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-$5$ and Virtex-$6$ FPGAs. Our architecture is built around a...
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
AES ECHO hash functions implementation SHA-3
2011/2/24
We propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-$5$ and Virtex-$6$ FPGAs. Our architecture is built around a...
A Low-Area yet Performant FPGA Implementation of Shabal
implementation SHA-3 Shabal low area FPGA implementation
2010/7/13
In this paper, we present an efficient FPGA implementation of the SHA-3 hash function candidate Shabal. Targeted at the recent Xilinx Virtex-5 FPGA family, our design achieves a relatively high throug...
An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations
FPGA Technologies Area Examination SHA-3 Hash
2009/12/29
This paper presents an examination of the different FPGA
architectures used to implement the various hash function candidates
for the currently ongoing NIST-organised SHA-3 competition [1]. This
pa...
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves
Time-Area Optimized Public-Key Engines MQ-Cryptosystems Elliptic Curves
2009/6/5
In this paper ways to efficiently implement public-key schemes based onMultivariate Qua-
dratic polynomials (MQ-schemes for short) are investigated. In particular, they are claimed
to resist quantum...
Survival in the Wild:Robust Group Key Agreement in Wide-Area Networks
Group Key Agreement Fault Tolerance Robustness
2009/6/5
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure
group communication. GKA is very useful in many types of peer group scenarios and applications...