ABSTRACT

Embedded security is in constant evolvement and new applications are constantly emerging. Important examples are radio-frequency identification (RFID) tags and sensor nodes as they require efficient implementations of cryptographic protocols due to the limitations on number of gates, bandwith, power, etc.