A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs.
Kris TiriIngrid VerbauwhedePublished in: DATE (2005)
Keyphrases
- vlsi design
- countermeasures
- security measures
- power analysis
- secret key
- authentication protocol
- key exchange protocol
- block cipher
- smart card
- information security
- authentication mechanism
- security issues
- authentication scheme
- key management
- design methodology
- diffie hellman
- key agreement
- sensitive data
- encryption scheme
- databases
- security analysis
- security protocols
- encryption algorithm
- public key
- mathematical model
- computational intelligence
- object oriented
- case study
- information leakage
- data encryption
- neural network
- database