A hardware security solution against scan-based attacks.
Ankit MehtaDarius SaifRashid RashidzadehPublished in: ISCAS (2016)
Keyphrases
- security threats
- computer security
- security problems
- security protocols
- intrusion detection
- low cost
- cryptographic protocols
- security mechanisms
- security requirements
- countermeasures
- stream cipher
- hardware implementation
- computer systems
- access control
- denial of service attacks
- secure routing
- real time
- security risks
- block cipher
- chosen plaintext
- security issues
- information security
- java card
- cyber attacks
- security measures
- malicious attacks
- dedicated hardware
- security policies
- fault injection
- cryptographic algorithms
- advanced encryption standard
- security breaches
- network security
- intrusion prevention