ARC Processor Summit Proceedings

Video - Securing the System: Hardware/Software Tradeoffs in Security Implementations

Proper security in any system comes with design trade-offs where either performance or size is optimized. This presentation will highlight performance characteristics of various implementations of encryption and authentication cryptographic algorithms. These algorithm implementations cover size and speed optimized software, special instructions for hardware acceleration and full hardware offload in an ARC processor based system. This session will describe cryptographic software and discuss how plug-in based architectures can leverage different modes of hardware acceleration.
Derek Bouius, Technical Marketing Manager, Synopsys

Thank you for your interest in the presentations from the event.

Please complete the registration form and click the 'continue >>' button below.

Required Required Fields

Business Email:Required
First Name:Required
Last Name:Required
Phone:Required
Job Title:Required
Company:Required
Country/Region:Required
Address:Required
City:Required
State/Province:
Optional
Postal/Zip Code:Required