Linear ciphers and random sequence generators with multiple clocks
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
IEEE Pervasive Computing
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
High speed networking security: design and implementation of two new DDP-based ciphers
Mobile Networks and Applications
Power modeling and efficient FPGA implementation of FHT for signal processing
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
An FPGA-based implementation of the Pomaranch stream cipher
Proceedings of the 3rd international conference on Mobile multimedia communications
A bidirectional Bluetooth authentication scheme based on game-theoretic framework
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0
Microprocessors & Microsystems
Hi-index | 0.00 |
The authors present a hardware implementation of the Bluetooth system security layer. The Bluetooth security layer includes key-generating mechanisms, authentication, and data encryption. The first two can be implemented in software or hardware. For applications where the processing time is not critical, the software implementation usually satisfies user requirements. However, in time-critical applications requiring a fast connection and in devices with processing constraints, the hardware implementation is preferable.