Login / Signup

Dynamically changeable secure scan architecture against scan-based side channel attack.

Yuta AtobeYouhua ShiMasao YanagisawaNozomu Togawa
Published in: ISOCC (2012)
Keyphrases
  • authentication protocol
  • smart card
  • secret key
  • security protocols
  • key distribution
  • scan data
  • management system
  • countermeasures
  • neural network
  • network architecture
  • key management
  • block cipher
  • power analysis