• Citations Per Year
Learn More
1 (State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou 450001) Abstract: Fully homomorphic is an encryption scheme that allows for data to be stored and processed in an encrypted format, which gives the cloud provider a solution to host and process data without even knowing what the message is. In previous identity-based(More)
The Hardware Trojans act as a new malicious attack for the underlying hardware, the research of method based on side-channel analysis become one of important contents for information security. But the method of Hardware Trojans detection based on side-channel analysis easily been affected by noise, and its detection model has low precision. This article(More)
  • 1