By Topic

FPGA-based implementation alternatives for keyed-hash message authentication code in networked embedded systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Heinrich, E. ; Fac. of Comput. Sci. & Electr. Eng., Univ. of Rostock, Rostock, Germany ; Luder, M. ; Joost, R. ; Salomon, R.

Field-programmable gate arrays provide a very flexible implementation platform that supports the development of tamper-proof networked embedded systems. In order to achieve a secure mode of operation, many of these systems employ keyed-hash message authentication code, to provide security against intentional tampering. Since this algorithm is of high computational complexity, this paper utilizes various hardware-software co-design techniques for its implementation, and compares the results to standard software. The considered techniques vary in the degree of required design expertise and of how (software) functionalities are implemented in hardware logic.

Published in:

Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference on

Date of Conference:

22-25 Sept. 2009