Configuration Tampering of BRAM-based AES Implementations on FPGAs.
Daniel ZienerJutta PirklJürgen TeichPublished in: ReConFig (2018)
Keyphrases
- digital images
- reverse engineering
- forensic analysis
- secret key
- efficient implementation
- authentication scheme
- cryptographic algorithms
- robust watermarking scheme
- field programmable gate array
- jpeg images
- s box
- watermarking scheme
- image authentication
- hardware software
- optimal configuration
- hardware implementation
- tamper detection
- fragile watermarking scheme