Handbook of Signal Processing Systems 2013
DOI: 10.1007/978-1-4614-6859-2_7
|View full text |Cite
|
Sign up to set email alerts
|

Signal Processing for Cryptography and Security Applications

Abstract: Embedded devices need both an efficient and a secure implementation of cryptographic primitives. In this chapter we show how common signal processing techniques are used in order to achieve both objectives. Regarding efficiency, we first give an example of accelerating hash function primitives using the retiming transformation, a well known technique to improve signal processing applications. Second, we outline the use of some special features of DSP processors and techniques earlier developed for efficient im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 54 publications
0
2
0
Order By: Relevance
“…Troncoso-Pastoriza and Perez-Gonzalez have an excellent survey of the problems and solution techniques for privacy in cloud computing [18]. There are many other examples among varying fields; secure signal processing [11], biometrics [19], and [14]. Many specific examples exist that use the Paillier encryption scheme (see [10] for scheme definition).…”
Section: Related Workmentioning
confidence: 99%
“…Troncoso-Pastoriza and Perez-Gonzalez have an excellent survey of the problems and solution techniques for privacy in cloud computing [18]. There are many other examples among varying fields; secure signal processing [11], biometrics [19], and [14]. Many specific examples exist that use the Paillier encryption scheme (see [10] for scheme definition).…”
Section: Related Workmentioning
confidence: 99%
“…In (Knezevi, 2013) the authors illustrate how signal processing techniques can be used to design and implement cryptographic and security applications. Implementations on DSP processors of well known hash functions, public-key algorithms are described in detail.…”
Section: Related Workmentioning
confidence: 99%