Secure Your SoC: Building System-an-Chip Designs for Security.
Shivam BhasinTrevor E. CarlsonAnupam ChattopadhyayVinay B. Y. KumarAvi MendelsonRomain PoussierYaswanth TavvaPublished in: SoCC (2020)
Keyphrases
- security issues
- security requirements
- security level
- application specific integrated circuits
- security mechanisms
- key management
- security measures
- security management
- security protocols
- security analysis
- security architecture
- information security
- security model
- security properties
- authentication protocol
- sensitive data
- key agreement protocol
- data encryption
- low power
- integrity verification
- data security
- identity management
- low cost
- security services
- encryption scheme
- stream cipher
- diffie hellman
- high speed
- authentication scheme
- cryptographic protocols
- key distribution
- authentication mechanism
- trusted computing
- key exchange
- key establishment
- public key encryption
- secure communication
- access control
- user authentication
- security policies
- intrusion detection
- smart card
- key agreement
- network security
- rfid systems
- digital signature scheme
- previously mentioned
- nm technology
- electronic voting
- high security
- key exchange protocol
- key management scheme
- hardware and software
- security patterns
- public key
- secret key
- secure multiparty computation
- digital signature
- private key
- cloud computing
- mobile agent system