메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 1414-1415

CMOS structures suitable for secured hardware

Author keywords

[No Author keywords available]

Indexed keywords

DATA RANDOMIZATION; MICROELECTRONIC DESIGN; POWER CONSUMPTION; SPICE SIMULATIONS; CMOS STRUCTURES; INFORMATION LEAKAGE; MEMORYLESS; NAND GATE;

EID: 3042609835     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DATE.2004.1269113     Document Type: Conference Paper
Times cited : (35)

References (5)
  • 1
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis: Leaking secrets. Proc. of CRYPTO'99, 1666:388-397, 1999.
    • (1999) Proc. of CRYPTO'99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 3
    • 0032296806 scopus 로고    scopus 로고
    • Modeling and comparing CMOS implementations of the C-element
    • M. Shams, J. Ebergen, and M. Elmasry. Modeling and comparing CMOS implementations of the C-element, IEEE Transactions on VLSI Systems, 6(4):563-567, 1998.
    • (1998) IEEE Transactions on VLSI Systems , vol.6 , Issue.4 , pp. 563-567
    • Shams, M.1    Ebergen, J.2    Elmasry, M.3
  • 5
    • 11244267009 scopus 로고    scopus 로고
    • An investigation into the security of self-timed circuits
    • Z. Yu, S. Furber, and L. Plana. An investigation into the security of self-timed circuits. Proc. of Async'03, 2003.
    • (2003) Proc. of Async'03
    • Yu, Z.1    Furber, S.2    Plana, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.