Sign in

IP core protection using voltage-controlled side-channel receivers.

Peter SamarinKerstin Lemke-RustChristof Paar
Published in: HOST (2016)
Keyphrases
  • power system
  • information security
  • high voltage
  • countermeasures
  • transmission line
  • computer controlled
  • data sets
  • neural network
  • artificial intelligence
  • operating conditions
  • privacy protection
  • secret key