Security Analysis of Hardware Trojans on Approximate Circuits.
Yuqin DouShichao YuChongyan GuMáire O'NeillChenghua WangWeiqiang LiuPublished in: ACM Great Lakes Symposium on VLSI (2020)
Keyphrases
- security analysis
- smart card
- security requirements
- circuit design
- high security
- public key
- real time
- low cost
- image encryption
- encryption scheme
- encryption algorithm
- security properties
- authentication protocol
- authentication scheme
- user authentication
- image processing
- security model
- embedded systems
- inter frame
- proxy signature scheme