Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications.
Debapriya Basu RoyShivam BhasinSylvain GuilleyJean-Luc DangerDebdeep MukhopadhyayXuan Thuy NgoZakaria NajmPublished in: SPACE (2015)
Keyphrases
- information security
- network security
- access control
- intrusion detection
- security policies
- security issues
- statistical databases
- computer security
- security properties
- low cost
- security requirements
- security mechanisms
- reconfigurable architecture
- information assurance
- security model
- human operators
- general purpose
- security systems
- search algorithm
- security management
- digital signal
- image processing
- real time