B. Arazi

Suggest Changes
Learn More
Secure communications among mobile components, like wireless sensors and RFID tags, emerge as a fundamental branch of network security, needing message confidentiality, integrity and authentication.(More)
  • B. Arazi
  • 48th Midwest Symposium on Circuits and Systems…
  • 2005
An approach for hardware synthesis of hashing transformations is presented, where the prescribed features that define a secure transformation are enforced by the design rules. This approach is(More)
  • 1