Journal articles on the topic 'Crypto Processor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Crypto Processor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rashid, Muhammad, Sajjad Shaukat Jamal, Sikandar Zulqarnain Khan, Adel R. Alharbi, Amer Aljaedi, and Malik Imran. "Elliptic-Curve Crypto Processor for RFID Applications." Applied Sciences 11, no. 15 (July 31, 2021): 7079. http://dx.doi.org/10.3390/app11157079.
Full textCho, Wook-Lae, Ki-Bbeum Kim, Gi-Chur Bae, and Kyung-Wook Shin. "A Crypto-processor Supporting Multiple Block Cipher Algorithms." Journal of the Korea Institute of Information and Communication Engineering 20, no. 11 (November 30, 2016): 2093–99. http://dx.doi.org/10.6109/jkiice.2016.20.11.2093.
Full textSomani, Turki F. Al, M. K. Ibrahim, and Adnan Gutub. "High Performance Elliptic Curve GF(2m) Crypto-processor." Information Technology Journal 5, no. 4 (June 15, 2006): 742–48. http://dx.doi.org/10.3923/itj.2006.742.748.
Full textSaad, Mahaba, Khalid Youssef, Mohamed Tarek, and Hala Abdel-Kader. "Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 412. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp412-423.
Full textAhmadi, Hamid Reza, Ali Afzali-Kusha, and Massoud Pedram. "A power-optimized low-energy elliptic-curve crypto-processor." IEICE Electronics Express 7, no. 23 (2010): 1752–59. http://dx.doi.org/10.1587/elex.7.1752.
Full textBouesse, Fraidy, M. Renaudin, and Fabien Germain. "Asynchronous AES Crypto-Processor Including Secured and Optimized Blocks." Journal of Integrated Circuits and Systems 1, no. 1 (November 16, 2004): 5–13. http://dx.doi.org/10.29292/jics.v1i1.249.
Full textMachhout, Mohsen, Zied Guitouni, Kholdoun Torki, and Lazhar Khriji. "Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor." International journal of Network Security & Its Applications 2, no. 2 (April 25, 2010): 100–112. http://dx.doi.org/10.5121/ijnsa.2010.2208.
Full textImran, Malik, Muhammad Rashid, Atif Raza Jafri, and Muhammad Najam-ul-Islam. "ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication." IEEE Access 6 (2018): 22778–93. http://dx.doi.org/10.1109/access.2018.2828319.
Full textHuang, Hai, Bin Yu, Zhiwei Liu, Rui Weng, Junfeng Gao, and Mingyuan Ren. "DPA countermeasures for reconfigurable crypto processor using non-deterministic execution." IEICE Electronics Express 15, no. 24 (2018): 20180987. http://dx.doi.org/10.1587/elex.15.20180987.
Full textQin, Xiaotie. "Software Architecture for IPSec Crypto Offload Based on Security Processor." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 952–58. http://dx.doi.org/10.2174/1874444301406010952.
Full textImran, Malik, Muhammad Rashid, Atif Raza Jafri, and Muhammad Kashif. "Throughput/area optimised pipelined architecture for elliptic curve crypto processor." IET Computers & Digital Techniques 13, no. 5 (March 25, 2019): 361–68. http://dx.doi.org/10.1049/iet-cdt.2018.5056.
Full textZhu, Yihong, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, and Leibo Liu. "LWRpro: An Energy-Efficient Configurable Crypto-Processor for Module-LWR." IEEE Transactions on Circuits and Systems I: Regular Papers 68, no. 3 (March 2021): 1146–59. http://dx.doi.org/10.1109/tcsi.2020.3048395.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (August 1, 2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textHan, Jun, Renfeng Dou, Lingyun Zeng, Shuai Wang, Zhiyi Yu, and Xiaoyang Zeng. "A Heterogeneous Multicore Crypto-Processor With Flexible Long-Word-Length Computation." IEEE Transactions on Circuits and Systems I: Regular Papers 62, no. 5 (May 2015): 1372–81. http://dx.doi.org/10.1109/tcsi.2015.2407431.
Full textKahri, Fatma, Hassen Mestiri, Belgacem Bouallegue, and Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor." Journal of Circuits, Systems and Computers 25, no. 04 (February 2, 2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.
Full textKang, Jae-Seok, and Min-Sup Kang. "FPGA Implementation of ARIA Crypto-processor Based on Advanced Key Scheduling." Journal of Security Engineering 13, no. 6 (December 31, 2016): 439–50. http://dx.doi.org/10.14257/jse.2016.12.05.
Full textAhmad, N., and S. M. Rezaul Hasan. "Efficient integrated AES crypto-processor architecture for 8-bit stream cipher." Electronics Letters 48, no. 23 (2012): 1456. http://dx.doi.org/10.1049/el.2012.2932.
Full textRashid, Muhammad. "Corrigendum: Throughput/area optimised pipelined architecture for elliptic curve crypto processor." IET Computers & Digital Techniques 15, no. 1 (January 2021): 77. http://dx.doi.org/10.1049/cdt2.12008.
Full textBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Full textKim, Hyunji, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, and Hwajeong Seo. "Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors." Mathematics 9, no. 7 (March 24, 2021): 705. http://dx.doi.org/10.3390/math9070705.
Full textRashid, Muhammad, Malik Imran, Atif Raza Jafri, and Turki F. Al-Somani. "Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review." Journal of Circuits, Systems and Computers 28, no. 03 (February 24, 2019): 1930003. http://dx.doi.org/10.1142/s0218126619300034.
Full textMoon, Sangook, and Jongsu Park. "System Level Design of Reconfigurable Server Farms Using Elliptic Curve Cryptography Processor Engines." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/390176.
Full textSung, Mi-Ji, and Kyung-Wook Shin. "8.3 Gbps pipelined LEA Crypto-Processor Supporting ECB/CTR Modes of operation." Journal of the Korea Institute of Information and Communication Engineering 20, no. 12 (December 31, 2016): 2333–40. http://dx.doi.org/10.6109/jkiice.2016.20.12.2333.
Full textAl-Somani, Turki F., M. K. Ibrahim, and Adnan Gutub. "Highly Efficient Elliptic Curve Crypto-Processor with Parallel GF(2m) Field Multipliers." Journal of Computer Science 2, no. 5 (May 1, 2006): 395–400. http://dx.doi.org/10.3844/jcssp.2006.395.400.
Full textSUGIYAMA, Shotaro, Hiromitsu AWANO, and Makoto IKEDA. "Low Latency 256-bit $\mathbb{F}_p$ ECDSA Signature Generation Crypto Processor." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 12 (December 1, 2018): 2290–96. http://dx.doi.org/10.1587/transfun.e101.a.2290.
Full textLiu, Leibo, Bo Wang, Chenchen Deng, Min Zhu, Shouyi Yin, and Shaojun Wei. "Anole: A Highly Efficient Dynamically Reconfigurable Crypto-Processor for Symmetric-Key Algorithms." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, no. 12 (December 2018): 3081–94. http://dx.doi.org/10.1109/tcad.2018.2801229.
Full textImran, Malik, and Faisal Shehzad. "FPGA Based Crypto Processor for Elliptic Curve Point Multiplication (ECPM) Over GF(2233)." International Journal for Information Security Research 7, no. 1 (March 30, 2017): 706–13. http://dx.doi.org/10.20533/ijisr.2042.4639.2017.0082.
Full textC, Lakshmi. "Reconfigurable Design of Low Power Hybrid Crypto Processor using Signcryption for Wireless Networks." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 4030–36. http://dx.doi.org/10.30534/ijatcse/2020/228932020.
Full textCavo, Luis, Sébastien Fuhrmann, and Liang Liu. "Design of an area efficient crypto processor for 3GPP-LTE NB-IoT devices." Microprocessors and Microsystems 72 (February 2020): 102899. http://dx.doi.org/10.1016/j.micpro.2019.102899.
Full textBikos, Anastasios N., and Nicolas Sklavos. "Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE." IEEE Transactions on Dependable and Secure Computing 15, no. 5 (September 1, 2018): 729–41. http://dx.doi.org/10.1109/tdsc.2016.2620437.
Full textEl-Hadidi, Mahmoud T., Hany M. Elsayed, Karim Osama, Mohamed Bakr, and Heba K. Aslan. "Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm." Journal of Advanced Research 12 (July 2018): 67–78. http://dx.doi.org/10.1016/j.jare.2017.11.002.
Full textY.A, Suryawanshi, and Neha Trimbak Khadgi. "Design of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis." International Journal of Distributed and Parallel systems 4, no. 3 (May 31, 2013): 95–104. http://dx.doi.org/10.5121/ijdps.2013.4308.
Full textDAN, Yong-ping, Xue-cheng ZOU, Zheng-lin LIU, Yu HAN, and Li-hua YI. "Design of highly efficient elliptic curve crypto-processor with two multiplications over GF(2163)." Journal of China Universities of Posts and Telecommunications 16, no. 2 (April 2009): 72–79. http://dx.doi.org/10.1016/s1005-8885(08)60206-x.
Full textVenugopal, K. R., G. Leelavathi, and K. Shaila. "Reconfigurable hardware architecture of public key crypto processor for VANET and wireless sensor nodes." International Journal of Vehicle Information and Communication Systems 5, no. 1 (2020): 11. http://dx.doi.org/10.1504/ijvics.2020.10029202.
Full textLeelavathi, G., K. Shaila, and K. R. Venugopal. "Reconfigurable hardware architecture of public key crypto processor for VANET and wireless sensor nodes." International Journal of Vehicle Information and Communication Systems 5, no. 1 (2020): 11. http://dx.doi.org/10.1504/ijvics.2020.107179.
Full textKang, Jae-Seok, and Min-Sup Kang. "Design of AES Crypto-processor Based on Composite Field S-Box for Security CCTV System." Journal of Security Engineering 13, no. 5 (October 31, 2016): 363–78. http://dx.doi.org/10.14257/jse.2016.10.05.
Full textChoi, Piljoo, Ji-Hoon Kim, and Dong Kyue Kim. "Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property." IEEE Access 7 (2019): 98684–93. http://dx.doi.org/10.1109/access.2019.2929299.
Full textRani, Deevi Radha, and S. Venkateswarlu. "Security against Timing Analysis Attack." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (August 1, 2015): 759. http://dx.doi.org/10.11591/ijece.v5i4.pp759-764.
Full textAbu Khadra, Shaimaa, Salah Eldin S. E. Abdulrahman, and Nabil A. Ismail. "Towards Efficient FPGA Implementation of Elliptic Curve Crypto-Processor for Security in IoT and Embedded Devices." Menoufia Journal of Electronic Engineering Research 29, no. 2 (July 1, 2020): 106–18. http://dx.doi.org/10.21608/mjeer.2020.103280.
Full textSbiaa, Fatma, Sonia Kotel, Medien Zeghid, Rached Tourki, Mohsen Machhout, and Adel Baganne. "High-Level Implementation of a Chaotic and AES Based Crypto-System." Journal of Circuits, Systems and Computers 26, no. 07 (March 17, 2017): 1750122. http://dx.doi.org/10.1142/s0218126617501225.
Full textHo Won Kim and Sunggu Lee. "Design and implementation of a private and public key crypto processor and its application to a security system." IEEE Transactions on Consumer Electronics 50, no. 1 (February 2004): 214–24. http://dx.doi.org/10.1109/tce.2004.1277865.
Full textKASHIF, Muhammad, and İhsan ÇİÇEK. "Field-programmable gate array (FPGA) hardware design and implementation of a new area efficient elliptic curve crypto-processor." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 29, no. 4 (July 26, 2021): 2127–39. http://dx.doi.org/10.3906/elk-2008-8.
Full textAWANO, Hiromitsu, Tadayuki ICHIHASHI, and Makoto IKEDA. "An ASIC Crypto Processor for 254-Bit Prime-Field Pairing Featuring Programmable Arithmetic Core Optimized for Quadratic Extension Field." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 1 (January 1, 2019): 56–64. http://dx.doi.org/10.1587/transfun.e102.a.56.
Full textKumar, Raghavan, Xiaosen Liu, Vikram Suresh, Harish K. Krishnamurthy, Sudhir Satpathy, Mark A. Anders, Himanshu Kaul, Krishnan Ravichandran, Vivek De, and Sanu K. Mathew. "A Time-/Frequency-Domain Side-Channel Attack Resistant AES-128 and RSA-4K Crypto-Processor in 14-nm CMOS." IEEE Journal of Solid-State Circuits 56, no. 4 (April 2021): 1141–51. http://dx.doi.org/10.1109/jssc.2021.3052146.
Full textKim, Ki-Bbeum, Wook-Lae Cho, and Kyung-Wook Shin. "A Design of PRESENT Crypto-Processor Supporting ECB/CBC/OFB/CTR Modes of Operation and Key Lengths of 80/128-bit." Journal of the Korea Institute of Information and Communication Engineering 20, no. 6 (June 30, 2016): 1163–70. http://dx.doi.org/10.6109/jkiice.2016.20.6.1163.
Full textHaija, Qasem Abu Al, and Ahmad Al Badawi. "Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures." International Journal of Information and Computer Security 5, no. 3 (2013): 236. http://dx.doi.org/10.1504/ijics.2013.055840.
Full textWeku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (April 30, 2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.
Full textKong, Jia Hao, Li-Minn Ang, and Kah Phooi Seng. "A Very Compact AES-SPIHT Selective Encryption Computer Architecture Design with Improved S-Box." Journal of Engineering 2013 (2013): 1–26. http://dx.doi.org/10.1155/2013/785126.
Full textMurvay, Pal-Stefan, and Bogdan Groza. "Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms." International Journal of Secure Software Engineering 4, no. 4 (October 2013): 1–24. http://dx.doi.org/10.4018/ijsse.2013100101.
Full textRamalingam, Soodamani, Hock Gan, Gregory Epiphaniou, and Emilio Mistretta. "A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments." Sensors 20, no. 18 (September 14, 2020): 5252. http://dx.doi.org/10.3390/s20185252.
Full text