SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
Abstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security an...
Saved in:
Main Authors: | Nitish Das, Aruna Priya Panchanathan |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-09-01
|
Series: | IET Computers & Digital Techniques |
Subjects: | |
Online Access: | https://doi.org/10.1049/cdt2.12029 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
FPGA Implementation of Reconfigurable Finite State Machine with Input Multiplexing Architecture Using Hungarian Method
by: Nitish Das, et al.
Published: (2018-01-01) -
Application of fuzzy modeling in the evaluation of crisis state of enterprises
by: M. N. Belousova, et al.
Published: (2019-04-01) -
Combined Rough Sets and Rule-Based Expert System to Support Environmentally Oriented Sandwich Pallet Loading Problem
by: Piotr Sawicki, et al.
Published: (2025-01-01) -
Co-Secure Domination Number in Some Graphs
by: Jiatong Cui, et al.
Published: (2024-12-01) -
Implementation of finite state logic machines via the dynamics of atomic systems
by: Dawit Hiluf Hailu
Published: (2025-02-01)