Security concerns for battery-operated wireless systems require the development of energy-efficient data-encryption techniques that can adapt to the time-varying data rates and quality-of-service requirements inherent in a wireless application. This work describes the design and implementation of a configurable encryption processor that allows the security provided to be traded off with respect to the energy that is dissipated to encrypt a bit. The processor features an embedded high-efficiency variable-output DC/DC converter that allows the supply voltage to be dynamically varied to match the time-varying throughput and quality requirements of the data stream being encrypted. The resulting processor consumes 134 mW at 2.5 V when encrypting...
Project (M.S., Electrical and Electronic Engineering) -- California State University, Sacramento, 20...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
This paper presents the first hardware implementation of the datagram transport layer security (DTLS...
In many applications, it is desirable to design digital processors that allow a trade-off between th...
Resources in the wireless environment are limited. The processor has limited capacity and there is l...
We consider two of the most important design issues for distributed sensor networks in the battlefie...
Resources in the wireless environment are limited. The processor has limited capacity and there is l...
Resources in the wireless environment are limited. The processor has limited capacity and there is l...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In...
Summarization: Supporting high levels of security in wireless networks is a challenging issue becaus...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Abstract—Dynamic power management techniques and related voltage converter architectures are propose...
In past years, cryptography has been considered a dif cult task to achieve on sensor nodes for the ...
Project (M.S., Electrical and Electronic Engineering) -- California State University, Sacramento, 20...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
This paper presents the first hardware implementation of the datagram transport layer security (DTLS...
In many applications, it is desirable to design digital processors that allow a trade-off between th...
Resources in the wireless environment are limited. The processor has limited capacity and there is l...
We consider two of the most important design issues for distributed sensor networks in the battlefie...
Resources in the wireless environment are limited. The processor has limited capacity and there is l...
Resources in the wireless environment are limited. The processor has limited capacity and there is l...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In...
Summarization: Supporting high levels of security in wireless networks is a challenging issue becaus...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Abstract—Dynamic power management techniques and related voltage converter architectures are propose...
In past years, cryptography has been considered a dif cult task to achieve on sensor nodes for the ...
Project (M.S., Electrical and Electronic Engineering) -- California State University, Sacramento, 20...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
This paper presents the first hardware implementation of the datagram transport layer security (DTLS...