2021
DOI: 10.1049/cdt2.12029
|View full text |Cite
|
Sign up to set email alerts
|

SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization

Abstract: Recently, the finite state machine (FSM)-based digital controllers are susceptible to faultinjection and side-channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security and optimization. This article proposes the security-dominated FSM state assignment technique (SD-SHO), which obtains a satisfactory level of FSM optimization as well. It is a deterministic algorithm and consists of two key tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 33 publications
0
0
0
Order By: Relevance