Hardware fabrics for cryptographic algorithms
Protecting confidential information is a far from trivial task. It is at least a two-side problem. First, cryptographic algorithms have to be designed to resist theoretical attacks; second, these algorithms are likely to be implemented and run in untrusted environments. Such environments increase th...
Main Author: | |
---|---|
Published: |
University of Bristol
2014
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.681560 |