On the synthesis of attack tolerant cryptographic hardware.
Jimson MathewSavita BanerjeeHafizur RahamanDhiraj K. PradhanSaraju P. MohantyAbusaleh M. JabirPublished in: VLSI-SoC (2010)
Keyphrases
- random number generator
- differential power analysis
- hardware and software
- smart card
- low cost
- real time
- block cipher
- power analysis
- protection schemes
- secret key
- information security
- parallel hardware
- countermeasures
- computing power
- vlsi implementation
- embedded systems
- computer systems
- program synthesis
- massively parallel
- computing systems
- hash functions
- hardware implementation
- cryptographic protocols
- s box
- security protocols
- key management
- public key cryptography
- data acquisition