Login / Signup
Malicious key emission via hardware Trojan against encryption system.
David Hély
Maurin Augagneur
Yves Clauzel
Jeremy Dubeuf
Published in:
ICCD (2012)
Keyphrases
</>
data encryption standard
low cost
private key
encryption algorithms
real time
computing power
hardware and software
personal computer
public key
high security
advanced encryption standard
image processing
hardware implementation
circuit design
secure communication
malicious behavior