Methods for Secure Hardware Implementations
|Organization:||Boston University, MA, US|
|I.P. Brief:||This technology pertains to the design of secure digital circuits that are resistant to power and fault analysis attacks. The technology allows the design of secure cryptographic devices which do not leak sensitive information when monitored by a malicious attacker. |
|Keywords:||security, applied cryptography, side channel attacks, secure hardware|
|Specific Market:||Mobile computers, cellular phones, PDAs|
Full IP Descriptions available on-site.