Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
In recent years, some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environments like mobile information appliances, where computing resources and power availability are limited. In this paper, we select a set of public-key, symmetri...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Conference Proceeding |
| Language: | English |
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|