Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations.
Samaneh GhandaliThorben MoosAmir MoradiChristof PaarPublished in: CoRR (2019)
Keyphrases
- provably secure
- key management
- standard model
- low cost
- security model
- public key
- hash functions
- real time
- blind signature
- signature scheme
- blind signature scheme
- secret key
- partially blind signature scheme
- diffie hellman
- computer systems
- embedded systems
- wireless sensor networks
- threshold signature scheme
- encryption scheme
- smart card
- data integration
- sensor networks
- high dimensional