Download Now Free registration required
The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for embedded systems. The security requirements, such as authentication, confidentiality and integrity, always make computationally intensive processes and can easily become the bottleneck of the related applications. This paper implements Elliptic Curve Cryptography (ECC) on an embedded multicore system, and explores the task scheduling methods in different levels.
- Format: PDF
- Size: 215.7 KB