Deepak Krishnankutty

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been(More)
  • 1