메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1362-1365

Towards trojan-free trusted ICs: Problem analysis and detection scheme

Author keywords

[No Author keywords available]

Indexed keywords

INDUSTRIAL ENGINEERING; INTEGRATED CIRCUITS; MILITARY APPLICATIONS; MILITARY COMMUNICATIONS; MILITARY OPERATIONS; TESTING; VECTORS;

EID: 49749105556     PISSN: 15301591     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DATE.2008.4484928     Document Type: Conference Paper
Times cited : (289)

References (7)
  • 3
    • 0034334788 scopus 로고    scopus 로고
    • Chip detectives
    • Nov
    • J. Kumagai. Chip detectives. IEEE Spectrum, 37(11):43-49, Nov. 2000.
    • (2000) IEEE Spectrum , vol.37 , Issue.11 , pp. 43-49
    • Kumagai, J.1
  • 4
    • 37549006416 scopus 로고    scopus 로고
    • Vim-scan: A low overhead scan design approach for protection of secret key in scan-based secure chips
    • S. Paul, R. S. Chakraborty, and S. Bhunia. Vim-scan: A low overhead scan design approach for protection of secret key in scan-based secure chips. VLSI Test Symposium (VTS), 2007.
    • (2007) VLSI Test Symposium (VTS)
    • Paul, S.1    Chakraborty, R.S.2    Bhunia, S.3
  • 6
  • 7
    • 33744734677 scopus 로고    scopus 로고
    • A digital design flow for secure integrated circuits
    • K. Tiri and I. Verbauwhede. A digital design flow for secure integrated circuits. IEEE TCAD, pages 1197-1208, 2006.
    • (2006) IEEE TCAD , pp. 1197-1208
    • Tiri, K.1    Verbauwhede, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.