![]() |
||||
![]() |
![]() |
![]() |
![]() |
![]() |
Design Challenges for Security
By Gregory Baudet, Barco Silex
The need for security in embedded application is continuously rising. And Public Key cryptography is one of the most common ways to secure data communication. But Public Key processing requires very large computation capability.
Processors are commonly used to perform complex operations. However, the heavy processing load generated by Public Key cannot be addressed by CPUs without significantly degrading system performances.
Smart IP Cores can provide the optimal combination of hardware and software (micro-code). This kind of architecture provides is the best of both worlds: the efficiency of hardware and the flexibility of software.
Biography: