메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 37-43

A unified architecture for crypto-processing in embedded systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; EMBEDDED SYSTEMS; PROGRAM PROCESSORS; SECURITY OF DATA; STORAGE ALLOCATION (COMPUTER);

EID: 33847720353     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICESS.2005.14     Document Type: Conference Paper
Times cited : (4)

References (21)
  • 1
    • 4544328538 scopus 로고    scopus 로고
    • IBM PCI cryptographic coprocessor, May, Manual
    • IBM PCI cryptographic coprocessor, May 2002. General Information Manual.
    • (2002) General Information
  • 3
    • 0035390239 scopus 로고    scopus 로고
    • Brief contributions: High-radix Montgomery modular exponentiation on reconfigurable hardware
    • July
    • T. Blum and C. Paar. Brief contributions: high-radix Montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers, 50(7):759-764, July 2001.
    • (2001) IEEE Transactions on Computers , vol.50 , Issue.7 , pp. 759-764
    • Blum, T.1    Paar, C.2
  • 5
    • 0035505389 scopus 로고    scopus 로고
    • An energy-efficient reconfigurable public-key cryptography processor
    • November
    • J. Goodman and A. P. Chandrakasan. An energy-efficient reconfigurable public-key cryptography processor. IEEE Journal of Solid-State Circuit, 36(11):1808-1820, November 2001.
    • (2001) IEEE Journal of Solid-State Circuit , vol.36 , Issue.11 , pp. 1808-1820
    • Goodman, J.1    Chandrakasan, A.P.2
  • 6
    • 1942455360 scopus 로고    scopus 로고
    • Design and implementation of a private and public key crypto processor and its application to a security system
    • Feberuary
    • H. W. Kim and S. Lee. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Transactions on Consumer Electronics, 50(1):214-224, Feberuary 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 214-224
    • Kim, H.W.1    Lee, S.2
  • 8
    • 33847705302 scopus 로고
    • The Art of Computer Promgramming
    • Addison-Wesley
    • D. Knuth. The Art of Computer Promgramming: Vol.2, Seminumerical Algorithms. Addison-Wesley, 1981.
    • (1981) Seminumerical Algorithms , vol.2
    • Knuth, D.1
  • 10
    • 4444331720 scopus 로고    scopus 로고
    • Security as a new dimendion in embedded system design
    • June 7-11, San Diego, California, USA, June
    • P. Kocher, R. Lee, G. McGraw, A. Roughunathan, and S. Ravi. Security as a new dimendion in embedded system design. ACM DAC 2004, June 7-11, 2004, San Diego, California, USA, pages 753-760, June 2004.
    • (2004) ACM DAC 2004 , pp. 753-760
    • Kocher, P.1    Lee, R.2    McGraw, G.3    Roughunathan, A.4    Ravi, S.5
  • 12
    • 0036501882 scopus 로고    scopus 로고
    • On a unified architecture for video-on-demand services
    • J. Y. B. Lee. On a unified architecture for video-on-demand services. IEEE Transactions on Multimedia, 4(1), 2002.
    • (2002) IEEE Transactions on Multimedia , vol.4 , Issue.1
    • Lee, J.Y.B.1
  • 15
    • 4344624969 scopus 로고    scopus 로고
    • Proceedings of the 2004 International Symposium on Circuits and Systems, 2004 (ISCAS '04)
    • 52:II:889-892, May
    • A. W. Ng, T. S. Ng, and K. W. Yip. A unified architecture of md5 and ripemd-160 hash algorithms. Proceedings of the 2004 International Symposium on Circuits and Systems, 2004 (ISCAS '04), 52:II:889-892, May 2004.
    • (2004)
    • Ng, A.W.1    Ng, T.S.2    Yip, K.W.3
  • 16
    • 33845432604 scopus 로고
    • Probabilistic algorithm for testing primality
    • M. O. Rabin. Probabilistic algorithm for testing primality. Number Theory, 12:128-138, 1980.
    • (1980) Number Theory , vol.12 , pp. 128-138
    • Rabin, M.O.1
  • 17
    • 0030704439 scopus 로고    scopus 로고
    • Design and implementaion of a coprocessor for cryptography applications
    • March
    • A. Royo, J. Moran, and J. C. Lopez. Design and implementaion of a coprocessor for cryptography applications. European Design and Test Conference, pages 231-227, March 1997.
    • (1997) European Design and Test Conference , pp. 231-227
    • Royo, A.1    Moran, J.2    Lopez, J.C.3
  • 18
    • 0141831855 scopus 로고    scopus 로고
    • A scalable architecture for mudular multiplication based on Montgomery's algorithm
    • F. A. Tenca and K. z. Koc. A scalable architecture for mudular multiplication based on Montgomery's algorithm. IEEE Transactions on Computers, 52(9), 2003.
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.9
    • Tenca, F.A.1    Koc, K.Z.2
  • 20
    • 33847723811 scopus 로고    scopus 로고
    • Efficient high radix modular multiplication for high-speed computing in re-configurable hardware
    • May
    • Y. Wang, J. Leiwo, and T. Srikanthan. Efficient high radix modular multiplication for high-speed computing in re-configurable hardware. IEEE International. Symposium on Circuits and Systems, pages 1226-1229, May 2005.
    • (2005) IEEE International. Symposium on Circuits and Systems , pp. 1226-1229
    • Wang, Y.1    Leiwo, J.2    Srikanthan, T.3
  • 21
    • 68549104046 scopus 로고    scopus 로고
    • Physical security devices for computer sub-systems: A suvey of attacks and defences. CHES 2000, LNCS 1965
    • S. H. Weingart. Physical security devices for computer sub-systems: A suvey of attacks and defences. CHES 2000, LNCS 1965, Springer-verlag Berlin Heidelberg 2000, pages 302-317, 2000.
    • (2000) Springer-verlag Berlin Heidelberg 2000 , pp. 302-317
    • Weingart, S.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.