Secure JTAG Implementation Using Schnorr Protocol.
Amitabh DasJean DaRoltSantosh GhoshStefaan SeysSophie DupuisGiorgio Di NataleMarie-Lise FlottesBruno RouzeyreIngrid VerbauwhedePublished in: J. Electron. Test. (2013)
Keyphrases
- covert channel
- cryptographic protocols
- lightweight
- key distribution
- secure routing
- security protocols
- authentication protocol
- cryptographic algorithms
- client server architecture
- key exchange protocol
- group communication
- security analysis
- trusted third party
- mutual authentication
- secure communication
- electronic voting
- rfid systems