Hardware Trojan for an authenticated encryption Minalpher.
Yusuke NozakiYoshiya IkezakiMasaya YoshikawaPublished in: GCCE (2016)
Keyphrases
- key exchange
- low cost
- hardware and software
- encryption scheme
- real time
- computing systems
- authentication scheme
- hardware implementation
- key exchange protocol
- embedded systems
- security analysis
- image encryption
- secret key
- diffie hellman
- key management
- hardware design
- hardware architecture
- encryption algorithms
- vlsi implementation
- key distribution
- computing power
- massively parallel
- operating system
- information systems