Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

In recent years, some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environments like mobile information appliances, where computing resources and power availability are limited. In this paper, we select a set of public-key, symmetri...

Full description

Saved in:
Bibliographic Details
Main Authors: Murat Fiskiran, Lee
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!