Fig. 1From: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissionsTPM diagram. The TPM neural network consists of input, hidden, and output layers to generate keys from its weightsBack to article page