Login / Signup
Protecting against Cryptographic Trojans in FPGAs.
Pawel Swierczynski
Marc Fyrbiak
Christof Paar
Christophe Huriaux
Russell Tessier
Published in:
FCCM (2015)
Keyphrases
</>
smart card
field programmable gate array
hardware software
key management
differential power analysis
access control
hash functions
cryptographic protocols
ad hoc networks
embedded systems
database
digital signature
fpga implementation
secure communication
evolutionary algorithm
random number generator
data sets