Compact hardware accelerator for field multipliers suitable for use in ultra-low power IoT edge devices

Adoption of IoT technology without considering its security implications may expose network systems to a variety of security breaches. In network systems, IoT edge devices are a major source of security risks. Implementing cryptographic algorithms on most IoT edge devices can be difficult due to the...

Full description

Bibliographic Details
Main Authors: Atef Ibrahim, Fayez Gebali
Format: Article
Language:English
Published: Elsevier 2022-12-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1110016822004653