Learn More
The Hardware Trojans act as a new malicious attack for the underlying hardware, the research of method based on side-channel analysis become one of important contents for information security. But the method of Hardware Trojans detection based on side-channel analysis easily been affected by noise, and its detection model has low precision. This article(More)
Fully homomorphic is an encryption scheme that allows for data to be stored and processed in an encrypted format, which gives the cloud provider a solution to host and process data without even knowing what the message is. In previous identity-based homomorphic encryption scheme, computing efficiency is complicated and expensive. In this work, based on(More)
  • 1