Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

22 Sep 2019 Ghandali Samaneh Moos Thorben Moradi Amir Paar Christof

Hardware Trojans have drawn the attention of academia, industry and government agencies. Effective detection mechanisms and countermeasures against such malicious designs can only be developed when there is a deep understanding of how hardware Trojans can be built in practice, in particular Trojans specifically designed to avoid detection... (read more)

PDF Abstract
No code implementations yet. Submit your code now

Categories


  • CRYPTOGRAPHY AND SECURITY
  • HARDWARE ARCHITECTURE