메뉴 건너뛰기




Volumn 19, Issue 2, 2010, Pages 53-60

On the hardware implementation cost of crypto-Processors architectures

Author keywords

Computer architecture; Crypto Processor; Cryptography; Network security; VLSI design

Indexed keywords

ALTERNATIVE DESIGNS; ASIC DEVICE; COMPUTATIONAL METHODOLOGY; COMPUTER ARITHMETIC; CRYPTO-PROCESSOR; CRYPTOPROCESSORS; DESIGN EFFICIENCY; DIFFERENT MODES; ELECTRONIC SERVICES; ENCRYPTION ALGORITHMS; HARDWARE IMPLEMENTATIONS; HARDWARE INTEGRATIONS; MODERN TECHNOLOGIES; OPERATION MODE; RECONFIGURABLE COMPUTING; SECURE COMMUNICATIONS; SYSTEM ARCHITECTURES; TIME TO MARKET; VLSI DESIGN;

EID: 79960660075     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393551003649016     Document Type: Article
Times cited : (38)

References (10)
  • 5
    • 0003855464 scopus 로고    scopus 로고
    • Applied Cryptography - Protocols
    • 2nd ed.). New York: John Wiley and Sons
    • Schneier, B. (1996). Applied Cryptography - Protocols, Algorithms and Source Code in C (2nd ed.). New York: John Wiley and Sons.
    • (1996) Algorithms and Source Code In C
    • Schneier, B.1
  • 8
    • 0036933530 scopus 로고    scopus 로고
    • Architectures and VLSI imple-mentations of the AES-proposal Rijndael
    • Sklavos, N. and Koufopavlou, O. (2002). Architectures and VLSI imple-mentations of the AES-proposal Rijndael. IEEE Transactions on Computers, 51(12), 1454-1459.
    • (2002) IEEE Transactions On Computers , vol.51 , Issue.12 , pp. 1454-1459
    • Sklavos, N.1    Koufopavlou, O.2
  • 9
    • 15544371957 scopus 로고    scopus 로고
    • Implementation of the SHA-2 hash family standard using FPGAs
    • Sklavos, N. and Koufopavlou, O. (2005). Implementation of the SHA-2 hash family standard using FPGAs. Journal of Supercomputing,31(3), 227-248.
    • (2005) Journal of Supercomputing , vol.31 , Issue.3 , pp. 227-248
    • Sklavos, N.1    Koufopavlou, O.2
  • 10
    • 33646724556 scopus 로고    scopus 로고
    • Design, architecture and performance evaluation of thewireless transport layer security(WTLS)
    • Sklavos, N., Kitsos, P., Papadopoulos, K., and Koufopavlou, O. (2006). Design, architecture and performance evaluation of thewireless transport layer security(WTLS). Journal of Supercomputing, 36(1).
    • (2006) Journal of Supercomputing , vol.36 , Issue.1
    • Sklavos, N.1    Kitsos, P.2    Papadopoulos, K.3    Koufopavlou, O.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.