Weakening the Isolation Assumption of Tamper-proof Hardware Tokens.
Rafael DowsleyJörn Müller-QuadeTobias NilgesPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- hardware and software
- low cost
- computing power
- computing systems
- hardware architecture
- image processing
- computer systems
- hardware implementation
- neural network
- hardware design
- jpeg images
- theorem proving
- massively parallel
- embedded systems
- naive bayes
- high end
- single chip
- data sets
- security properties
- image authentication
- complete axiomatization