Hardware Trojan Horses in Cryptographic IP Cores.
Shivam BhasinJean-Luc DangerSylvain GuilleyXuan Thuy NgoLaurent SauvagePublished in: FDTC (2013)
Keyphrases
- multi core processors
- random number generator
- address space
- low cost
- processor core
- smart card
- internet protocol
- parallel architectures
- real time
- hardware implementation
- hardware and software
- terrorist activities
- computing power
- general purpose processors
- computer systems
- hardware architecture
- ip addresses
- key management
- random number
- hardware design
- protection schemes
- security protocols
- end to end
- high end
- massively parallel
- computing systems
- embedded systems
- advanced encryption standard
- data acquisition
- image processing