[PDF][PDF] LASE: Latency aware simple encryption for embedded systems security

K Courtright, MI Husain, R Sridhar - International journal of computer …, 2009 - Citeseer
Security in the area of embedded systems has been drawing enormous attention lately.
Although recent advances in hardwarebased security models have shown promise for faster …

Compactrio based real time implementation of AES algorithm for embedded applications

R Naoufal - International Journal of Embedded and Real-Time …, 2019 - igi-global.com
For real-time embedded applications, several factors (time, cost, power) that are moving
security considerations from a function-centric perspective into a system architecture …

A comparison of data encryption algorithms with the proposed algorithm: Wireless security

SR Masadeh, S Aljawarneh, N Turab… - The 6th International …, 2010 - ieeexplore.ieee.org
Encryption algorithms play a main role in wireless network security systems. However, those
algorithms consume a significant amount of computing resources such as CPU time, and …

Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors

K Jiang, A Lifa, P Eles, Z Peng, W Jiang - Proceedings of the 21st …, 2013 - dl.acm.org
We approach the emerging area of energy efficient, secure real-time embedded systems
design. Many modern embedded systems have to fulfill strict security constraints and are …

Energy aware real-time scheduling policy with guaranteed security protection

W Jiang, K Jiang, X Zhang, Y Ma - 2014 19th Asia and South …, 2014 - ieeexplore.ieee.org
In this work, we address the emerging scheduling problem existed in the design of secure
and energy-efficient real-time embedded systems. The objective is to minimize the energy …

Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis

R Venugopalan, P Ganesan… - Proceedings of the …, 2003 - dl.acm.org
Recent research in sensor networks has raised issues of security for small embedded
devices. Security concerns are motivated by the deployment of a large number of sensory …

Design and implementation of a customized encryption algorithm for authentication and secure communication between devices

B Daddala, H Wang, AY Javaid - 2017 IEEE National …, 2017 - ieeexplore.ieee.org
In the current world, encryption plays a significant role in securing relevant information from
attackers. The applications of such protocols fall under numerous categories ranging from …

A short review of security-aware techniques in real-time embedded systems

H Chai, G Zhang, J Zhou, J Sun, L Huang… - Journal of Circuits …, 2019 - World Scientific
With the rapid development of embedded systems, users and services have been greatly
facilitated while also experiencing security threats as a result of cyber-attacks and system …

[PDF][PDF] The Sesame algorithm: session management for asynchronous message encryption

M Marlinspike, T Perrin - Revision, 2017 - signal.org
The Sesame Algorithm: Session Management for Asynchronous Message Encryption Page 1
The Sesame Algorithm: Session Management for Asynchronous Message Encryption Moxie …

Taking a hard-line approach to encryption

C Laird - Computer, 2007 - ieeexplore.ieee.org
Taking a Hard-Line Approach to Encryption Page 1 March 2007 13 Published by the IEEE
Computer Society INDUSTRY TRENDS Information security during the past few years has …