2007
DOI: 10.1109/mdt.2007.4343582
|View full text |Cite
|
Sign up to set email alerts
|

Security-Performance Trade-offs in embedded systems using flexible ECC hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…No safe errors can be introduced based on our proposed scheme. In order to pass the PV, the outputs from the coordinate conversion must be correct, which means both intermediate results P 1 and P 2 must be used in order to calculate the y value at the last step of coordinate conversion. So, no safe errors can be introduced in either P 1 or P 2 .…”
Section: Security Analysis Of the Proposed Unified Countermeasurementioning
confidence: 99%
See 2 more Smart Citations
“…No safe errors can be introduced based on our proposed scheme. In order to pass the PV, the outputs from the coordinate conversion must be correct, which means both intermediate results P 1 and P 2 must be used in order to calculate the y value at the last step of coordinate conversion. So, no safe errors can be introduced in either P 1 or P 2 .…”
Section: Security Analysis Of the Proposed Unified Countermeasurementioning
confidence: 99%
“…By using the random scalar splitting scheme (K = K 1 + K 2 ) the final results have to be obtained through two steps of point operations. For the first step, we use López-Dahab projective coordinates and Montgomery Scalar Multiplication to get two results for K 1 · P and K 2 · P. If transient faults are inserted during this step, before coordinate conversion the invariant relation of intermediate point Q [0] and Q [1] (see Fig. 1) will be destroyed.…”
Section: Security Analysis Of the Proposed Unified Countermeasurementioning
confidence: 99%
See 1 more Smart Citation
“…Next, security concerns of geographical data and required security policies are studied through the data model [8], [7]. The trade-off between security and performance in the embedded systems for cryptography implementation as a critical factor is evaluated [10]. In [9] Using geographical location as an authentication factor is studied.…”
Section: Introductionmentioning
confidence: 99%
“…This problem has a technological dimension (how to support confidentiality with a given reconfigurable fabric) as well as a methodological, protocol-oriented dimension [Gogniat et al 2005;Drimer 2007]. -Methods are needed to quantify the trade-offs between security, performance, and power in reconfigurable circuits, in particular in the area of · 1: 3 cryptographic algorithms [Alrimeih and Rakhmatov 2007]. In addition, formally verifiable design automation techniques ensure that synthesis will maintain trust and security properties in the design [Hammarberg and Nadjm-Tehrani 2003].…”
Section: Introductionmentioning
confidence: 99%