ABSTRACT
References.................................................................................................... 209
Building information technology applications is not possible without ensuring
security. Cryptographic algorithms are an essential part of a modern security
layer. In real-world applications, security measures have to be balanced
against their cost, as well as the value of the protected data and the probability
of attacks. In wireless applications it happens quite often that in at least one
of the devices there are severe limitations on the available computing
power, memory, chip area or code size, and electrical power or energy. This
influences the choices a designer has to make when deciding on the trade-off
between security and cost.