Hardware fabrics for cryptographic algorithms

Protecting confidential information is a far from trivial task. It is at least a two-side problem. First, cryptographic algorithms have to be designed to resist theoretical attacks; second, these algorithms are likely to be implemented and run in untrusted environments. Such environments increase th...

Full description

Bibliographic Details
Main Author: Wojcik, Marcin
Published: University of Bristol 2014
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.681560