Building and maintaining a silicon foundry is a costly endeavor that req...
Numerous security threats are emerging from untrusted players in the
int...
Neural networks (NNs) are already deployed in hardware today, becoming
v...
Threats associated with the untrusted fabrication of integrated circuits...
Polynomial multiplication is a bottleneck in most of the public-key
cryp...
Security of currently deployed public key cryptography algorithms is for...