Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
ECC on constrained devices

Speaker  Junfeng Fan

Affiliation  K.U.Leuven

Host  Kristin Lauter

Duration  00:51:47

Date recorded  21 October 2010

The embedded security community has been looking at the ECC ever since it was introduced. Hardware designers are now challenged by limited area (15k Gates), low power budget (100uw) and sophisticated physical attacks. This talk will report the state-of-the-art ECC implementations for ultra-constrained devices. We take a passive RFID tag as our potential target. We will discuss the known techniques to realize ECC on such kind of devices, and what are the challenges we face now and in the near future.

©2010 Microsoft Corporation. All rights reserved.
People also watched
> ECC on constrained devices