Login / Signup
Design Methods for Secure Hardware (NII Shonan Meeting 2014-11).
Kazuo Sakiyama
Patrick Schaumont
Ingrid Verbauwhede
Published in:
NII Shonan Meet. Rep. (2014)
Keyphrases
</>
significant improvement
empirical studies
low cost
data mining techniques
neural network
machine learning
information retrieval
artificial intelligence
computational cost
design principles
embedded systems
hardware and software
experimental design
security issues
vlsi implementation
programmable logic