A Novel Tampering Attack on AES Cores with Hardware Trojans.
Ayush JainUjjwal GuinPublished in: CoRR (2020)
Keyphrases
- secret key
- authentication scheme
- multi core processors
- block cipher
- advanced encryption standard
- encryption algorithm
- low cost
- forensic analysis
- malicious attacks
- smart card
- fault model
- hardware and software
- digital images
- detecting malicious
- processor core
- real time
- countermeasures
- computing systems
- hardware implementation
- computer systems
- computing power
- cryptographic algorithms
- parallel architectures
- reverse engineering
- watermarking scheme
- encryption decryption
- address space
- public key
- pseudorandom
- copyright protection
- massively parallel
- general purpose processors
- key management
- multimedia content
- signal processing