A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
Kris TiriIngrid VerbauwhedePublished in: CoRR (2007)
Keyphrases
- vlsi design
- countermeasures
- security measures
- power analysis
- secret key
- authentication protocol
- smart card
- key exchange protocol
- authentication scheme
- information security
- authentication mechanism
- block cipher
- design methodology
- security analysis
- key agreement
- security requirements
- security issues
- diffie hellman
- standard model
- key management
- user authentication
- sensitive data
- control system
- information leakage
- case study
- neural network
- ciphertext
- access control
- artificial neural networks