Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function.
James ThesingDhireesha KudithipudiPublished in: VLSI Design (2018)
Keyphrases
- hash functions
- block cipher
- power analysis
- differential power analysis
- stream cipher
- similarity search
- hashing algorithm
- data distribution
- hamming distance
- neural network
- locality sensitive hashing
- hash table
- provably secure
- nearest neighbor search
- secret key
- encryption scheme
- database management systems
- data sets
- binary codes
- signature scheme
- input data
- data structure