A Full-Stack Approach for Side-Channel Secure ML Hardware.
Anuj DubeyAydin AysuPublished in: ITC (2023)
Keyphrases
- maximum likelihood
- low cost
- hardware and software
- real time
- hardware implementation
- computer systems
- lightweight
- smart card
- countermeasures
- application level
- hardware design
- trusted computing
- computing power
- protection scheme
- parallel hardware
- computing systems
- security requirements
- key management
- security analysis
- image processing
- massively parallel
- cryptographic protocols
- covert channel
- hardware architecture
- circuit design
- embedded systems
- em algorithm
- information systems