A course in number theory and cryptography
A course in number theory and cryptography
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Software security and privacy risks in mobile e-commerce
Communications of the ACM
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
BT Technology Journal
Biometrics: A New Era in Security
Computer
Subword Parallelism with MAX-2
IEEE Micro
Battery-Driven System Design: A New Frontier in Low Power Design
ASP-DAC '02 Proceedings of the 2002 Asia and South Pacific Design Automation Conference
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Lightweight Security Mechanisms for Wireless Video Transmission
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Securing electronic commerce: reducing the SSL overhead
IEEE Network: The Magazine of Global Internetworking
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Security wrappers and power analysis for SoC technologies
Proceedings of the 1st IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Low energy security optimization in embedded cryptographic systems
Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Security requirements in service oriented architectures for ubiquitous computing
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Performance Considerations for an Embedded Implementation of OMA DRM 2
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
A split-mask countermeasure for low-energy secure embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
Multiple-channel security architecture and its implementation over SSL
EURASIP Journal on Wireless Communications and Networking
Configuration and extension of embedded processors to optimize IPSec protocol execution
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
International Journal of Web and Grid Services
EM analysis of a wireless Java-based PDA
ACM Transactions on Embedded Computing Systems (TECS)
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
Information Security Applications
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Information Security and Cryptology
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
International Journal of High Performance Systems Architecture
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
A table masking countermeasure for low-energy secure embedded systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
EM analysis of rijndael and ECC on a wireless java-based PDA
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Security is critical to a wide range of current and future wireless data applications and services. This paper highlights the challenges posed by the need for security during system architecture design for wireless handsets, and provides an overview of emerging techniques to address them. We focus on the computational requirements for securing wireless data transactions, revealing a gap between these requirements and the trends in processing capabilities of embedded processors used in wireless handsets. We also demonstrate that the use of security protocols causes significant degradation in battery life, a problem that will worsen due to the slow growth in battery capacities. These trends point to a wireless security processing gap that, unless addressed, will impede the deployment of secure high-speed wireless data and multi-media applications. We discuss approaches that are currently being pursued to bridge this gap, including low-complexity cryptographic algorithms, security enhancements to embedded processors, and advanced system architectures for wireless handsets that are enabled by new system-level design methodologies.