1 resultado para Hardware IP Security
em Universidad de Alicante
Filtro por publicador
- Repository Napier (1)
- Aberystwyth University Repository - Reino Unido (11)
- Adam Mickiewicz University Repository (5)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (2)
- Aquatic Commons (36)
- Archive of European Integration (93)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (8)
- Biblioteca Digital da Câmara dos Deputados (1)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (6)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (3)
- Boston College Law School, Boston College (BC), United States (1)
- Boston University Digital Common (6)
- Brock University, Canada (12)
- Bulgarian Digital Mathematics Library at IMI-BAS (3)
- Cambridge University Engineering Department Publications Database (24)
- Carolina Law Scholarship Repository (1)
- CentAUR: Central Archive University of Reading - UK (1)
- Center for Jewish History Digital Collections (3)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (44)
- Cochin University of Science & Technology (CUSAT), India (8)
- CORA - Cork Open Research Archive - University College Cork - Ireland (10)
- Cornell: DigitalCommons@ILR (5)
- Deakin Research Online - Australia (10)
- Digital Commons at Florida International University (4)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (6)
- DRUM (Digital Repository at the University of Maryland) (2)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (3)
- FUNDAJ - Fundação Joaquim Nabuco (1)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (1)
- Greenwich Academic Literature Archive - UK (1)
- Helda - Digital Repository of University of Helsinki (12)
- Indian Institute of Science - Bangalore - Índia (30)
- Instituto Politécnico do Porto, Portugal (8)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (2)
- Martin Luther Universitat Halle Wittenberg, Germany (4)
- Massachusetts Institute of Technology (4)
- Ministerio de Cultura, Spain (8)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (2)
- QSpace: Queen's University - Canada (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (236)
- Queensland University of Technology - ePrints Archive (261)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (6)
- Repositório Institucional da Universidade de Aveiro - Portugal (3)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (2)
- Research Open Access Repository of the University of East London. (5)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (4)
- SAPIENTIA - Universidade do Algarve - Portugal (4)
- School of Medicine, Washington University, United States (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad de Alicante (1)
- Universidad del Rosario, Colombia (9)
- Universidad Politécnica de Madrid (4)
- Universidade Federal do Rio Grande do Norte (UFRN) (1)
- Universitat de Girona, Spain (4)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (17)
- Université de Montréal, Canada (6)
- University of Queensland eSpace - Australia (2)
- University of Southampton, United Kingdom (30)
- WestminsterResearch - UK (12)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
As the user base of the Internet has grown tremendously, the need for secure services has increased accordingly. Most secure protocols, in digital business and other fields, use a combination of symmetric and asymmetric cryptography, random generators and hash functions in order to achieve confidentiality, integrity, and authentication. Our proposal is an integral security kernel based on a powerful mathematical scheme from which all of these cryptographic facilities can be derived. The kernel requires very little resources and has the flexibility of being able to trade off speed, memory or security; therefore, it can be efficiently implemented in a wide spectrum of platforms and applications, either software, hardware or low cost devices. Additionally, the primitives are comparable in security and speed to well known standards.