Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations.
Samaneh GhandaliThorben MoosAmir MoradiChristof PaarPublished in: IEEE Trans. Very Large Scale Integr. Syst. (2020)
Keyphrases
- provably secure
- key management
- standard model
- security model
- public key
- signature scheme
- low cost
- blind signature
- hash functions
- real time
- partially blind signature scheme
- secret key
- diffie hellman
- bilinear pairings
- smart card
- computer systems
- threshold signature scheme
- encryption scheme
- blind signature scheme
- information systems
- resource constrained
- sensitive data
- embedded systems
- response time
- data points