scispace - formally typeset
S

Srivaths Ravi

Researcher at Princeton University

Publications -  74
Citations -  3377

Srivaths Ravi is an academic researcher from Princeton University. The author has contributed to research in topics: Software & Embedded software. The author has an hindex of 28, co-authored 67 publications receiving 3255 citations.

Papers
More filters
Journal ArticleDOI

Security in embedded systems: Design challenges

TL;DR: An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified.
Journal ArticleDOI

A study of the energy consumption characteristics of cryptographic algorithms and security protocols

TL;DR: In this article, the authors present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols, and investigate the impact of various parameters at protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions.
Proceedings ArticleDOI

Analyzing the energy consumption of security protocols

TL;DR: This work presents a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that are used as building blocks in security protocols and studies the energy consumption requirements of the most popular transport-layer security protocol SSL (Secure Sockets Layer).
Proceedings ArticleDOI

Tamper resistance mechanisms for secure embedded systems

TL;DR: This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems.
Proceedings ArticleDOI

Optimizing public-key encryption for wireless clients

TL;DR: This work evaluates the proposed algorithmic optimization techniques by obtaining processing times for the SSL handshake protocol on a state-of-the-art embedded processor by using the optimal algorithm configuration and a popular conventional algorithm configuration.