共 14 条
[1]
Ghosal P., Biswas M., Biswas M., Hardware Implementation of TDES Crypto System with On Chip Verification in FPGA, Journal of Telecommunications, 1, 1, pp. 113-117, (2010)
[2]
Gurpreet S., Supriya S., A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security, International Journal of Computer Applications, 67, 19, pp. 33-38, (2013)
[3]
Li J., Zhang D., Qiu M., Security protection on FPGA against difierential power analysis attacks, Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (2011)
[4]
Golic J.D., Tymen C., Multiplicative masking and power analysis of AES, Cryptographic Hardware and Embedded Systems CCHES 2002, pp. 198-212, (2003)
[5]
Popp T., Mangad S., Masked dual-rail pre-charge logic: DPA-resistance without routing constraints, Cryptographic Hardware and Embedded Systems CCHES 2005, pp. 172-186, (2005)
[6]
Kocher P., Lee R., Security as a new dimension in embedded system design, pp. 753-760, (2004)
[7]
Hodjat A., HW/SW co-design and ASIP architectures for cryptographic primitives in embedded security systems, (2005)
[8]
Wu J., Pu W., Srikanthan T., Eficient heuristic and tabu search for hardware/software partitioning, The Journal of Supercomputing, 66, 1, pp. 118-134, (2013)
[9]
Wu J., Pu W., Srikanthan T., Eficient heuristic algorithms for path-based hardware/software partitioning, Mathematical and Computer Modelling, 51, 7, pp. 974-984, (2010)
[10]
Banerjee S., Dutt N., Eficient search space exploration for HWSW partitioning, Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, pp. 122-127, (2004)