ABSTRACT

References.................................................................................................... 209

Building information technology applications is not possible without ensuring

security. Cryptographic algorithms are an essential part of a modern security

layer. In real-world applications, security measures have to be balanced

against their cost, as well as the value of the protected data and the probability

of attacks. In wireless applications it happens quite often that in at least one

of the devices there are severe limitations on the available computing

power, memory, chip area or code size, and electrical power or energy. This

influences the choices a designer has to make when deciding on the trade-off

between security and cost.