Login / Signup
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs.
David Knichel
Thorben Moos
Amir Moradi
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
third party
reverse logistics
risk management
data providers
outsourced databases
sensitive information
information technology
win win
smart card
personal information
decision making
mashup
business process
service providers
private information
key management
internet protocol