Hardware Trojans in Wireless. Cryptographic ICs. – Steal sensitive information (i.e. key, plaintext). – Hide leaked data as “added” structure of the.

Login to Download