Back to Results
First PageMeta Content
Embedded system / Physical Unclonable Function / Trusted Computing / Key generation / Cyberwarfare / Computer security / Electronic engineering / SiliconBlue Technologies / Secure cryptoprocessor / Cryptography / Key management / Field-programmable gate array


1 Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering
Add to Reading List

Document Date: 2007-04-09 15:36:30


Open Document

File Size: 244,46 KB

Share Result on Facebook

Company

AES / /

/

/

IndustryTerm

direct communications / secure environment using adaptive hardware / adaptive hardware / covert communications channels / symmetric key applications / secret key algorithms / software co-design / given chip / given device / cryptography algorithms / energy consumption difference / encryption energy consumption difference / secure hash algorithm / secure co-processors / secure computing environment / trusted computing base / desktop systems / secure mobile computing environment / public key algorithms / generation server / energy / /

Organization

Department of Electrical and Computer Engineering Clemson University Clemson / /

Person

S. T. Sander / /

/

Position

embedded interpreter / Assistant professor / Associate Professor / interpreter / /

Product

Encryptor 142.349 MHz 2661 1.822 Gbps 11 / Decryptor 124.332 MHz 3364 1.591 Gbps 14 / /

Technology

encryption / FPGA / cryptography / PKI technology / public key / public key algorithms / 2 algorithms / secure co-processors / hardened processor / mobile computing / secure hash algorithm / digital signature / Symmetric key algorithms / given chip / cryptography algorithms / secret key algorithms / /

SocialTag