<--- Back to Details
First PageDocument Content
Cryptography / Hardware Trojan / RSA / Public-key cryptography / Key / ElGamal encryption / Digital signature / Advantage / Encryption
Date: 2017-12-30 21:51:58
Cryptography
Hardware Trojan
RSA
Public-key cryptography
Key
ElGamal encryption
Digital signature
Advantage
Encryption

A Touch of Evil: High-Assurance CryptographicHardware from Untrusted Components

Add to Reading List

Source URL: acmccs.github.io

Download Document from Source Website

File Size: 3,72 MB

Share Document on Facebook

Similar Documents

Cryptography / Computer security / Computer hardware / Hardware security module / Hardware security / Tamper resistance

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

DocID: 1xVDt - View Document

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski? , Sebastian Faust?? , and Fran¸cois-Xavier Standaert? ? ? 1 University of Warsaw

DocID: 1sUkW - View Document

Semiconductor devices / Electronic design / Hardware Trojan / Trojans / Electronic engineering / Field-programmable gate array / Integrated circuit / Cryptographic engineering / Trojan horse / Hardware obfuscation

SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

DocID: 1px28 - View Document

Integrated circuits / Automatic test pattern generation / Linear-feedback shift register / Built-in self-test / Scan chain / Hardware Trojan

Low Power MSIC Signatures for Effective BIST Design Chekka Narasimha Rao M.Tech Student, Audi Sankara Institute of Technology, NH-5 Bypass Road, East Gudur Rural, Andrapradesh

DocID: 1oOsm - View Document

Electronics manufacturing / Education / Tutorial / JTAG / Hardware Trojan / IEEE Computer Society

Intro At-a-Glance Tutorials Exhibits Plenary & Keynotes Technical

DocID: 1lKLC - View Document