-
1
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
Dakshi Agrawal, Selcuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, and Berk Sunar, "Trojan detection using ic fingerprinting," in Security and Privacy, 2007. SP '07. IEEE Symposium on, 2007, pp. 296-310.
-
(2007)
Security and Privacy, 2007. SP '07. IEEE Symposium on
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
2
-
-
34548319046
-
Design methods for security and trust
-
I. Verbauwhede and P. Schaumont, "Design methods for security and trust," in Design, Automation and Test in Europe Conference and Exhibition, 2007. DATE '07, 2007, pp. 1-6.
-
(2007)
Design, Automation and Test in Europe Conference and Exhibition, 2007. DATE '07
, pp. 1-6
-
-
Verbauwhede, I.1
Schaumont, P.2
-
4
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," Computers, IEEE Transactions on, vol. 51, no. 5, pp. 541-552, 2002.
-
(2002)
Computers, IEEE Transactions on
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
5
-
-
0000474763
-
Differential power analysis
-
Paul Kocher, Joshua Jaffe, and Benjamin Jun, "Differential power analysis," in Advances in Cryptology CRYPTO 99, pp. 789-789.
-
Advances in Cryptology CRYPTO
, vol.99
, pp. 789-789
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
6
-
-
34547294309
-
Trusted design in fpgas
-
New York, NY, USA, ACM
-
Steve Trimberger, "Trusted design in fpgas," in DAC '07: Proceedings of the 44th annual conference on Design automation, New York, NY, USA, 2007, pp. 5-8, ACM.
-
(2007)
DAC '07: Proceedings of the 44th annual conference on Design automation
, pp. 5-8
-
-
Trimberger, S.1
-
7
-
-
49749105556
-
Towards trojan-free trusted ics: Problem analysis and detection scheme
-
Chris Papachristou, Ed
-
Francis Wolff, Chris Papachristou, Swarup Bhunia, and Rajat S. A. Chakraborty Rajat S. Chakraborty, "Towards trojan-free trusted ics: Problem analysis and detection scheme," in Design, Automation and Test in Europe, 2008. DATE '08, Chris Papachristou, Ed., 2008, pp. 1362-1365.
-
(2008)
Design, Automation and Test in Europe, 2008. DATE '08
, pp. 1362-1365
-
-
Wolff, F.1
Papachristou, C.2
Bhunia, S.3
Chakraborty, R.S.A.4
Chakraborty, R.S.5
-
8
-
-
46449138830
-
Controlled physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Controlled physical random functions," in Computer Security Applications Conference, 2002. Proceedings. 18th Annual, 2002, pp. 149-160.
-
(2002)
Computer Security Applications Conference, 2002. Proceedings. 18th Annual
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
9
-
-
51849147541
-
-
Synopsys Inc, Version A, December
-
Synopsys Inc., Library Compiler User Guide, Version A-2007.12, December 2007.
-
(2007)
Library Compiler User Guide
, vol.12
, pp. 2007
-
-
-
10
-
-
51849115136
-
-
Synopsys Inc., Design Compiler User Guide, Version X-2005.09.
-
Synopsys Inc., Design Compiler User Guide, Version X-2005.09.
-
-
-
-
11
-
-
51849130425
-
-
Synopsys Inc., PrimeTime User Guide, Version X-2005.06, June 2005.
-
Synopsys Inc., PrimeTime User Guide, Version X-2005.06, June 2005.
-
-
-
-
12
-
-
51849084334
-
-
Synopsys Inc., TetraMAX ATPG User Guide, Version A-2007.12-SP2.
-
Synopsys Inc., TetraMAX ATPG User Guide, Version A-2007.12-SP2.
-
-
-
-
13
-
-
0030381077
-
The quickhull algorithm for convex hulls
-
C. Bradford Barber, David P. Dobkin, and Hannu Huhdanpaa, "The quickhull algorithm for convex hulls," ACM Trans. Math. Softw., vol. 22, no. 4, pp. 469-483, 1996.
-
(1996)
ACM Trans. Math. Softw
, vol.22
, Issue.4
, pp. 469-483
-
-
Bradford Barber, C.1
Dobkin, D.P.2
Huhdanpaa, H.3
|