Hardware Trojan Horses in Cryptographic IP Cores.
Shivam BhasinJean-Luc DangerSylvain GuilleyXuan Thuy NgoLaurent SauvagePublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- random number generator
- low cost
- multi core processors
- hardware and software
- parallel architectures
- processor core
- real time
- protection schemes
- terrorist activities
- ip networks
- smart card
- computer systems
- massively parallel
- security protocols
- computing systems
- hardware architecture
- embedded systems
- processing units
- graphics hardware
- random number
- address space
- communication networks
- operating system
- general purpose processors