dc.creator | Silva | |
dc.creator | NBF; Pigatto | |
dc.creator | DF; Martins | |
dc.creator | PS; Branco | |
dc.creator | KRLJC | |
dc.date | 2016 | |
dc.date | 2016-12-06T18:31:08Z | |
dc.date | 2016-12-06T18:31:08Z | |
dc.date.accessioned | 2018-03-29T02:03:44Z | |
dc.date.available | 2018-03-29T02:03:44Z | |
dc.identifier | | |
dc.identifier | Journal Of Network And Computer Applications. ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD, n. 60, p. 130 - 143. | |
dc.identifier | 1084-8045 | |
dc.identifier | WOS:000371098400009 | |
dc.identifier | 10.1016/j.jnca.2015.10.007 | |
dc.identifier | http://www-sciencedirect-com.ez88.periodicos.capes.gov.br/science/article/pii/S1084804515002283 | |
dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/320218 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1310984 | |
dc.description | Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) | |
dc.description | Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) | |
dc.description | Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP) | |
dc.description | Embedded systems are associations between hardware and software designed to perform a specific function. These systems are usually part of a larger system and their wireless communications are a hallmark. Therefore, it is important to guarantee a secure communication by ensuring the confidentiality of information, which is obtained through cryptography. Security has not traditionally been considered a requirement in embedded systems design and the application of specific security techniques to these devices is still incipient. This paper presents a performance evaluation analysis of cryptographic algorithms in embedded systems (namely RC2, AES, Blowfish, DES, 3DES, ECC and RSA). Parameters considered in the analysis are average processor and memory usage, response time and power consumption. The results show that symmetric and asymmetric algorithms such as Blowfish and ECC have a good performance in embedded systems when properly chosen for each situation. (C) 2015 Elsevier Ltd. All rights reserved. | |
dc.description | 60 | |
dc.description | | |
dc.description | 130 | |
dc.description | 143 | |
dc.description | CAPES | |
dc.description | CNPq | |
dc.description | FAPESP [573963/2008-9, 08/57870-9, 2012/13641-1, 2012/08498-5, 2012/16171-6] | |
dc.description | Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) | |
dc.description | Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) | |
dc.description | Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP) | |
dc.description | | |
dc.description | | |
dc.description | | |
dc.language | English | |
dc.publisher | ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD | |
dc.publisher | LONDON | |
dc.relation | Journal of Network and Computer Applications | |
dc.rights | fechado | |
dc.source | WOS | |
dc.subject | Performance Evaluation | |
dc.subject | Cryptographic Algorithms | |
dc.subject | Embedded Systems | |
dc.title | Case Studies Of Performance Evaluation Of Cryptographic Algorithms For An Embedded System And A General Purpose Computer | |
dc.type | Artículos de revistas | |