Skip to main content

and
  1. No Access

    Chapter

    Signal Processing for Cryptography and Security Applications

    Embedded devices need both an efficient and a secure implementation of cryptographic primitives. In this chapter we show how common signal processing techniques are used in order to achieve both objectives. Re...

    Miroslav Knežević, Lejla Batina, Elke De Mulder in Handbook of Signal Processing Systems (2013)

  2. No Access

    Chapter

    Signal Processing for Cryptography and Security Applications

    Embedded devices need both an efficient and a secure implementation of cryptographic primitives. In this chapter we show how common signal processing techniques are used in order to achieve both objectives. Re...

    Miroslav Knežević, Lejla Batina, Elke De Mulder in Handbook of Signal Processing Systems (2010)