Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware.
Anirban SenguptaMahendra RathorPublished in: IEEE Access (2019)
Keyphrases
- high security
- block cipher
- encryption algorithm
- private key
- secret key
- hash functions
- encryption decryption
- digital signal processor
- security analysis
- encryption algorithms
- encryption scheme
- digital signal processing
- protection schemes
- secure communication
- image encryption
- data encryption
- key management
- ciphertext
- security properties
- s box
- security measures
- cyber attacks
- advanced encryption standard
- key exchange protocol
- authentication mechanism
- signal processing
- public key
- elliptic curve cryptography
- low cost
- data security
- information security
- countermeasures
- security vulnerabilities
- virtual private network
- real time
- security protocols
- security mechanisms
- identity authentication
- security requirements
- smart card
- key exchange
- pseudorandom
- malware detection
- mutual authentication
- signature scheme
- digital content
- hardware implementation
- denial of service attacks
- intrusion detection
- integrity verification
- key distribution
- authentication scheme