Figure of Merits of 28nm Si Technologies for Implementing Laser Attack Resistant Security Dedicated Circuits.
Stephan De CastroGiorgio Di NataleMarie-Lise FlottesBruno RouzeyreJean-Max DutertrePublished in: ISVLSI (2015)
Keyphrases
- security measures
- countermeasures
- security vulnerabilities
- cyber attacks
- information security
- key exchange protocol
- fault injection
- denial of service attacks
- metal oxide
- security management
- security risks
- encryption algorithm
- malicious users
- authentication protocol
- malicious attacks
- security issues
- security properties
- authentication mechanism
- security and privacy issues
- access control
- identity management
- security threats
- intrusion detection
- statistical databases
- cmos technology
- security analysis
- high speed
- network security
- security policies
- security requirements
- java card
- block cipher
- secret key
- security protocols
- trust relationships
- critical infrastructure
- user authentication
- leakage current