CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme.
Mohsen JahanbaniZeinolabedin NorouziNasour BagheriPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- hardware implementation
- efficient implementation
- parallel architecture
- signal processing
- hardware design
- authentication scheme
- software implementation
- dedicated hardware
- image processing algorithms
- pipeline architecture
- fpga implementation
- image encryption scheme
- website
- key distribution
- computer vision
- image encryption
- general purpose processors
- standard model
- hardware architecture
- neural network
- field programmable gate array
- general purpose
- xml documents
- image processing
- machine learning