Sign in

An Implementation of Trojan Side-Channel with a Masking Scheme.

Wenlin MengWenfeng ZhuChi ZhangJunrong LiuZheng GuoDawu GuWei FanHaifeng ZhangYidong Yuan
Published in: CIS (2017)
Keyphrases
  • efficient implementation
  • neural network
  • detection scheme
  • secret sharing scheme
  • data mining
  • information systems
  • learning scheme
  • implementation issues
  • vlsi implementation
  • case study
  • smart card