Information System Security Design Using Hardware/Software Co-design Technology

Download Now
Provided by: AICIT
Topic: Hardware
Format: PDF
It is widely recognized that security in networks is still a significant challenge for researchers. A central tool for achieving system security is cryptographic algorithms which are computationally intensive. Among the various techniques found in the cryptography realm, the Rivest-Shamir-Adleman (RSA) algorithms, which is based on modular multiplications and exponentiation, has become the default standard for public key cryptography. It is computationally resource-intensive and time-consuming given a minimumally secure operand size of 1024 bits or greater. For high performance and considerable resistance to tampering attacks reasons, it is often advantageous to realize cryptographic algorithms in hardware.
Download Now

Find By Topic