Abstract
In recent years the importance of security in information technology has increased drastically. The main reason is the obvious demand for security software and hardware in growing applications like mobile telephones, set top boxes, wireless networks, smartcards and other distribution systems for entertainment and information. In addition to higher processing speed security hardware offers higher physical manipulation protection than software solutions. In connection with the growing core-based system design methods a cryptographic reuse library based on VHDL is presented in this contribution.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Schubert, A., Jährig, R., Anheier, W. (2001). Cryptographic Reuse Library. In: Seepold, R., Madrid, N.M. (eds) Virtual Components Design and Reuse. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-3275-7_9
Download citation
DOI: https://doi.org/10.1007/978-1-4757-3275-7_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4868-7
Online ISBN: 978-1-4757-3275-7
eBook Packages: Springer Book Archive