Login / Signup
Protecting cryptographic hardware against malicious attacks by nonlinear robust codes.
Victor Tomashevich
Yaara Neumeier
Raghavan Kumar
Osnat Keren
Ilia Polian
Published in:
DFT (2014)
Keyphrases
</>
malicious attacks
real time
low cost
hardware and software
computationally efficient
partial occlusion
massively parallel
image processing
high dimensional
artificial neural networks
robust estimation
computing power
parallel hardware