An evolutionary approach to hardware encryption and Trojan-horse mitigation.
Andrea MarcelliMarco RestifoErnesto SánchezGiovanni SquilleroPublished in: DATE (2017)
Keyphrases
- low cost
- hardware and software
- real time
- advanced encryption standard
- massively parallel
- embedded systems
- risk management
- vlsi implementation
- computing power
- computing systems
- hardware implementation
- computer systems
- data encryption
- image encryption
- protection schemes
- encryption algorithms
- high end
- circuit design
- encryption scheme
- personal computer
- signal processing
- evolutionary algorithm
- genetic algorithm
- neural network