ECC on constrained devices
- Junfeng Fan | K.U.Leuven
The embedded security community has been looking at the ECC ever since it was introduced. Hardware designers are now challenged by limited area (15k Gates), low power budget (100uw) and sophisticated physical attacks. This talk will report the state-of-the-art ECC implementations for ultra-constrained devices. We take a passive RFID tag as our potential target. We will discuss the known techniques to realize ECC on such kind of devices, and what are the challenges we face now and in the near future.
-
-
Jeff Running
-
Watch Next
-
-
-
Microsoft Transforms its Cloud Supply Chain with Optimization and Generative AI
- Peter Lee,
- Konstantina Mellou,
- Kayla Kummerlowe
-
-
Dion2: A new simple method to shrink matrix in Muon
- Anson Ho,
- Kwangjun Ahn
-
-
-
-
-