02 Jun 2008 Cryptographic Constraints for Smart Security Devices Applications
The goal of this document is to provide an overview on the cryptographic mechanisms specified today in the main smart security devices applications to compare with the recommendation of the different governmental institutions, and to provide some recommendations to the Smart Security Industry about how to move on.
paper_algorithm_constraints