Design and implementation of a private and public key crypto processor for next-generation it security applications
The growing problem of breaches in information security in recent years has created a demand for earnest efforts towards ensuring security in electronic systems. The successful deployment of these electronic systems for ecommerce, Internet banking, government online services, VPNs, mobile commerce,...
| Main Authors: | Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8069/ http://eprints.utm.my/8069/1/8069.pdf |
Similar Items
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005)
by: Hau, Yuan Wen
Published: (2005)
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006)
by: Paniandi, Arul
Published: (2006)
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
by: Ismail, Mohd. Izuan
Published: (2006)
by: Ismail, Mohd. Izuan
Published: (2006)
A true random number generator for crypto embedded systems
by: M.Thamrin, Norashikin, et al.
Published: (2006)
by: M.Thamrin, Norashikin, et al.
Published: (2006)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
Design of an Ultra High Speed AES Processor for Next Generation IT Security.
by: Aris, Ishak, et al.
Published: (2011)
by: Aris, Ishak, et al.
Published: (2011)
Crypto Embedded System for Electronic Document
by: Ahmad, Illiasaak, et al.
Published: (2006)
by: Ahmad, Illiasaak, et al.
Published: (2006)
Design of a high speed and low latency crypto-processor ASIC
by: Ali, Md. Liakot, et al.
Published: (2008)
by: Ali, Md. Liakot, et al.
Published: (2008)
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)
by: Alawatugoda, Janaka, et al.
Published: (2018)
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007)
by: d'Auriol, Brian J., et al.
Published: (2007)
Accelerating graph algorithms with priority queue processor
by: Heng Sun, Ch'ng, et al.
Published: (2006)
by: Heng Sun, Ch'ng, et al.
Published: (2006)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
Implementation of a soft core processor on a FPGA
by: Woo, Chi Liang
Published: (2011)
by: Woo, Chi Liang
Published: (2011)
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
Design of 6-Stage Pipeline Processor
by: Teng, Wen Jun
Published: (2021)
by: Teng, Wen Jun
Published: (2021)
Design of a floating point unit for 32-bit 5 stage pipeline processor
by: Low, Wai Hau
Published: (2020)
by: Low, Wai Hau
Published: (2020)
Grasp on next generation security operation centre (NGSOC):
by: Dun, Yau Ti, et al.
Published: (2021)
by: Dun, Yau Ti, et al.
Published: (2021)
Implementing a Next Generation Library System
by: Green, Peter
Published: (2014)
by: Green, Peter
Published: (2014)
IoT Light Weight (LWT) crypto functions
by: Jaleel, Nubila, et al.
Published: (2019)
by: Jaleel, Nubila, et al.
Published: (2019)
Improving security performance with parallel crypto operations in SSL bulk data transfer
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009)
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009)
VLSI Design of a neurohardware processor implementing the Kohonen Neural Network algorithm
by: Rajah, Avinash
Published: (2005)
by: Rajah, Avinash
Published: (2005)
Green and resilient: Strategies for next-generation infrastructure
by: Munirwan, Reza Pahlevi, et al.
Published: (2025)
by: Munirwan, Reza Pahlevi, et al.
Published: (2025)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007)
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007)
The Design of an Asynchronous RISC Processor
by: Pee, Yao Hong
Published: (2021)
by: Pee, Yao Hong
Published: (2021)
Performance evaluation of lightweight Crypto functions for Internet of things applications
by: Jaleel, Nubila, et al.
Published: (2020)
by: Jaleel, Nubila, et al.
Published: (2020)
Mischaracterised “Personal-Use” Crypto Assets
by: Allen, Christina
Published: (2024)
by: Allen, Christina
Published: (2024)
Coinhive's monero drive-by crypto-jacking
by: Azizah, Abdul Aziz, et al.
Published: (2020)
by: Azizah, Abdul Aziz, et al.
Published: (2020)
Centralized crypto exchanges (CEX) website
by: Gan, Hing Long
Published: (2023)
by: Gan, Hing Long
Published: (2023)
Design of digital signal processor
by: Teo,, Siaw Hui.
Published: (2009)
by: Teo,, Siaw Hui.
Published: (2009)
A brief review of massive MIMO technology for the next generation
by: Elmutasima, Imadeldin Elsayed
Published: (2023)
by: Elmutasima, Imadeldin Elsayed
Published: (2023)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013)
by: Alkhatib, Mohammad, et al.
Published: (2013)
Performance objectives of public private partnership implementation in Malaysia: Perception of key players
by: Mohamad, Rosnani, et al.
Published: (2018)
by: Mohamad, Rosnani, et al.
Published: (2018)
Next-generation OPAC
by: Abu Hanipah, Rabiahtul Adauwiyah, et al.
Published: (2011)
by: Abu Hanipah, Rabiahtul Adauwiyah, et al.
Published: (2011)
Asymmetric volatility and risk analysis of Bitcoin Crypto currency market
by: Yam, Xing Quan, et al.
Published: (2023)
by: Yam, Xing Quan, et al.
Published: (2023)
Embedded devices security: design and implementation of a light RDBMS encryption utilizing multi-core processors
by: Alomari, Mohammad Ahmed, et al.
Published: (2023)
by: Alomari, Mohammad Ahmed, et al.
Published: (2023)
Development and Implementation of Next Generation Molecular Tool Kits for Environmental Applications
by: Berry, Tina Elizabeth
Published: (2019)
by: Berry, Tina Elizabeth
Published: (2019)
Similar Items
-
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005) -
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006) -
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
by: Ismail, Mohd. Izuan
Published: (2006) -
A true random number generator for crypto embedded systems
by: M.Thamrin, Norashikin, et al.
Published: (2006) -
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)