메뉴 건너뛰기




Volumn , Issue , 2006, Pages 490-495

A network security processor design based on an integrated SOC design and test platform

Author keywords

AES; AMBA; HMAC MD5; HMAC SHA1; RNG; RSA

Indexed keywords

CMOS INTEGRATED CIRCUITS; NETWORK SECURITY; PROGRAM PROCESSORS; PROGRAMMABLE LOGIC CONTROLLERS; TIMING CIRCUITS;

EID: 34547157222     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1146909.1147039     Document Type: Conference Paper
Times cited : (18)

References (11)
  • 1
    • 85165859329 scopus 로고    scopus 로고
    • A. Frier, P. Karlton, and P. Kocher, The SSL Protocol Version 3.0, Netscape, Nov. 1996
    • A. Frier, P. Karlton, and P. Kocher, The SSL Protocol Version 3.0, http://wp.netscape.com/eng/ssl3/draft302.txt, Netscape, Nov. 1996.
  • 2
    • 0003068282 scopus 로고    scopus 로고
    • Security Architecture for the Internet Protocol, IETF Network Working Group
    • S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, IETF Network Working Group, 1998, rFC 2401.
    • (1998) rFC 2401
    • Kent, S.1    Atkinson, R.2
  • 3
    • 0007527004 scopus 로고    scopus 로고
    • What is a VPN? - Part I
    • June
    • P. Fergguson and G. Huston, "What is a VPN? - Part I," The Internet Protocol Jour., vol. 1, no. 1, pp. 2-19, June 1998, http://www.cisco.com/warp/public/759/.
    • (1998) The Internet Protocol Jour , vol.1 , Issue.1 , pp. 2-19
    • Fergguson, P.1    Huston, G.2
  • 5
    • 1942455360 scopus 로고    scopus 로고
    • Design and implementation of a private and public key crypto processor and its application to a security system
    • Feb
    • H.-W. Kim and S. Lee, "Design and implementation of a private and public key crypto processor and its application to a security system," IEEE Trans. on Consumer Electronics, vol. 50, no. 1, pp. 214-224, Feb. 2004.
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.1 , pp. 214-224
    • Kim, H.-W.1    Lee, S.2
  • 8
    • 84861427597 scopus 로고    scopus 로고
    • System-level design space exploration for security processor prototyping in analytical approaches
    • Shanghai, Jan
    • Y.-C. Lin, C.-W. Huang, and J.-K. Lee, "System-level design space exploration for security processor prototyping in analytical approaches," in Proc. Asia and South Pacific Design Automation Conf. (ASP-DAC), Shanghai, Jan. 2005, pp. 372-375.
    • (2005) Proc. Asia and South Pacific Design Automation Conf. (ASP-DAC) , pp. 372-375
    • Lin, Y.-C.1    Huang, C.-W.2    Lee, J.-K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.