Consolidating Security Notions in Hardware Masking.
Lauren De MeyerBegül BilginOscar ReparazPublished in: IACR Trans. Cryptogr. Hardw. Embed. Syst. (2019)
Keyphrases
- information security
- real time
- random number generator
- security issues
- hardware and software
- hardware implementation
- low cost
- security requirements
- embedded systems
- security policies
- image processing
- computer security
- intrusion detection
- information assurance
- trusted computing
- hardware design
- windows xp
- protection scheme
- signal processing
- personal computer
- computer systems
- network security
- biometric systems
- network management
- cyber security
- security mechanisms
- hardware architecture
- security level
- security problems
- vlsi implementation
- functional requirements
- computing power