Login / Signup
Designing Stealthy Trojans with Sequential Logic: A Stream Cipher Case Study.
Mukesh Reddy Rudra
Nimmy Anna Daniel
Varun Nagoorkar
David H. K. Hoe
Published in:
DAC (2014)
Keyphrases
</>
stream cipher
case study
secret key
scheme for wireless sensor networks
pseudorandom
security analysis
hash functions
real time
information systems
low cost
high speed
software development
access control
high security