Microblaze Implementation of HB-2 Crypto System with Its Cryptosystem with Its Authentication Protocol

Provided by: International Journal of Ethics in Engineering & Management Education (IJEEE)
Topic: Security
Format: PDF
Information technologies widely penetrate into people's day-to-day activity. This is one of the main trends of present-day society. An average man's life cannot be imagined without various gadgets. A lot of households use devices with an embedded operating system (besides usual personal computers), which can be connected to the Internet and can even be united into a wireless network. Everywhere people are surrounded by a variety of terminals, readers, sensors etc. Such expansion of smart technologies crucially raises data security problems.

Find By Topic