“…OneofthemainsecurityissuesfacedbyanAESacceleratoronFPGAsthatareusedincloud environmentisthesecurityofsecretkeyusedforencryptioninsidetheFPGA (Trimberger&Moore, 2014). Several types of hardware Trojans are being inserted into the accelerator by attackers for leakingthesecretkey.TheTrojanscanbeinsertedindifferentphasesinacceleratorcreationsuch asdesign,integration,testing,andbitstreamtransfer.Generally,itisdifficulttofindaTrojanorthe triggeringconditionofaTrojanbecausetheTrojancircuitwilldisguiseasafunctionalcircuitthat isnecessaryforthedesign.Poweranalysis,comparingthedesignwithagoldenone(Trojan-free design),andsoonarethemainmethodsusedtofindaTrojaninadesign.Ifthereisakey-leaking Trojan,thenittakesmorepowerthanusual (Bhasin,Danger,Guilley,Ngo,&Sauvage,2013;Jin& Makris,2010;Johnson,Saha,Chakraborty,Mukhopadhyay,&Gören,2014).DetectingaTrojanina designthroughpoweranalysisisdifficultbecausetofindthetriggeringconditionistimeconsuming andneedtocheckwithalargenumberoftestinputs.Comparingwithagoldendesignislessefficient asthereisaneedtostoremorethantwogoldendesigns (Mal-Sarkar,Krishna,Ghosh,&Bhunia, 2014;Mal-Sarkar,Karametal.,2016).…”