Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function
International Conference on VLSI Design(2018)
Key words
Side Channel Attacks,Correlation Power Analysis,Neuromorphic Computing,Neural Logic Block,SHA-3,Keccak
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined