-
1
-
-
62649134605
-
-
Defense Science Board DSB
-
Defense Science Board (DSB) study on high performance microchip supply (2006), http://www.acq.osd.mil/dsb/reports/2005-02-hpmsreportfinal.pdf
-
(2006)
study on high performance microchip supply
-
-
-
2
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
SP, pp
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: IEEE Symposium on Security and Privacy (SP), pp. 296-310 (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
3
-
-
31344435929
-
Cryptographic processors-a survey
-
Anderson, R., Bond, M., Clulow, J., Skorobogato, S.: Cryptographic processors-a survey. Proceedings of the IEEE 94(2), 357-369 (2006)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogato, S.4
-
5
-
-
33748535403
-
High-performance CMOS variability in the 65-nm regime and beyond
-
Bernstein, K., Frank, D.J., Gattiker, A.E., Haensch, W., Ji, B.L., Nassif, S.R., Nowak, E.J., Pearson, D.J., Rohrer, N.J.: High-performance CMOS variability in the 65-nm regime and beyond. IBM Journal of Research and Development 50(4/5), 433-450 (2006)
-
(2006)
IBM Journal of Research and Development
, vol.50
, Issue.4-5
, pp. 433-450
-
-
Bernstein, K.1
Frank, D.J.2
Gattiker, A.E.3
Haensch, W.4
Ji, B.L.5
Nassif, S.R.6
Nowak, E.J.7
Pearson, D.J.8
Rohrer, N.J.9
-
6
-
-
33646430870
-
Securing embedded systems
-
Hwang, D., Schaumont, P., Tiri, K., Verbauwhede, I.: Securing embedded systems. IEEE Security & Privacy 4(2), 40-49 (2006)
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.2
, pp. 40-49
-
-
Hwang, D.1
Schaumont, P.2
Tiri, K.3
Verbauwhede, I.4
-
8
-
-
34547252533
-
CAD-based security, cryptography, and digital rights management
-
DAC
-
Koushanfar, F., Potkonjak, M.: CAD-based security, cryptography, and digital rights management. In: Design Automation Conference, DAC (2007)
-
(2007)
Design Automation Conference
-
-
Koushanfar, F.1
Potkonjak, M.2
-
9
-
-
0034428343
-
IC identification circuits using device mismatch
-
Lofstrom, K., Daasch, W.R., Taylor, D.: IC identification circuits using device mismatch. In: International Solid State Circuits Conference (ISSCC), pp. 372-373 (2000)
-
(2000)
International Solid State Circuits Conference (ISSCC)
, pp. 372-373
-
-
Lofstrom, K.1
Daasch, W.R.2
Taylor, D.3
-
10
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
11
-
-
33645753044
-
Statistical Analysis and Optimization for VLSI: Timing and Power
-
Springer, Heidelberg
-
Srivastava, A., Sylvester, D., Blaauw, D.: Statistical Analysis and Optimization for VLSI: Timing and Power. Series on Integrated Circuits and Systems. Springer, Heidelberg (2005)
-
(2005)
Series on Integrated Circuits and Systems
-
-
Srivastava, A.1
Sylvester, D.2
Blaauw, D.3
-
12
-
-
34548818732
-
A 1.6J/bit stable chip ID generating circuit using process variations
-
to appear
-
Su, Y., Holleman, J., Otis, B.: A 1.6J/bit stable chip ID generating circuit using process variations. In: International Solid State Circuits Conference, ISSCC (2007) (to appear)
-
(2007)
International Solid State Circuits Conference, ISSCC
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
13
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DAC, pp
-
Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference (DAC), pp. 9-14 (2007)
-
(2007)
Design Automation Conference
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
14
-
-
50249129360
-
Can nano-photonic silicon circuits become an intra-chip interconnect technology?
-
ICCAD, p
-
Yablonovitch, E.: Can nano-photonic silicon circuits become an intra-chip interconnect technology? In: IEEE/ACM International Conference on Computer-Aided Design (ICCAD), p. 309 (2007)
-
(2007)
IEEE/ACM International Conference on Computer-Aided Design
, pp. 309
-
-
Yablonovitch, E.1
-
15
-
-
56749170623
-
-
Alkabani, Y., Koushanfar, F., Kiyavash, N., Potkonjak, M.: Trusted integrated circuits: A nondestructive hidden characteristics extraction approach. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, 5284, pp. 102-117. Springer, Heidelberg (2008)
-
Alkabani, Y., Koushanfar, F., Kiyavash, N., Potkonjak, M.: Trusted integrated circuits: A nondestructive hidden characteristics extraction approach. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 102-117. Springer, Heidelberg (2008)
-
-
-
-
16
-
-
51549088218
-
Input vector control for postsilicon leakage current minimization in the presence of manufacturing variability
-
DAC, pp
-
Alkabani, Y., Massey, T., Koushanfar, F., Potkonjak, M.: Input vector control for postsilicon leakage current minimization in the presence of manufacturing variability. In: Design Automation Conference (DAC), pp. 606-609 (2008)
-
(2008)
Design Automation Conference
, pp. 606-609
-
-
Alkabani, Y.1
Massey, T.2
Koushanfar, F.3
Potkonjak, M.4
-
17
-
-
70350068434
-
Hardware aging-based software metering
-
Dabiri, F., Potkonjak, M.: Hardware aging-based software metering. In: Design, Automation, and Test in Europe, DATE (2009)
-
(2009)
Design, Automation, and Test in Europe, DATE
-
-
Dabiri, F.1
Potkonjak, M.2
-
18
-
-
57849113504
-
Post-silicon timing characterization by compressed sensing
-
ICCAD, pp
-
Koushanfar, F., Boufounos, P., Shamsi, D.: Post-silicon timing characterization by compressed sensing. In: IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 185-189 (2008)
-
(2008)
IEEE/ACM International Conference on Computer-Aided Design
, pp. 185-189
-
-
Koushanfar, F.1
Boufounos, P.2
Shamsi, D.3
-
19
-
-
57549113706
-
Noninvasive leakage power tomography of integrated circuits by compressive sensing
-
Shamsi, D., Boufounos, P., Koushanfar, F.: Noninvasive leakage power tomography of integrated circuits by compressive sensing. In: International Symposium on Low power electronics and design (ISLPED), pp. 341-346 (2008)
-
(2008)
International Symposium on Low power electronics and design (ISLPED)
, pp. 341-346
-
-
Shamsi, D.1
Boufounos, P.2
Koushanfar, F.3
-
20
-
-
33645009272
-
A combined gate replacement and input vector control approach for leakage current reduction
-
Yuan, L., Qu, G.: A combined gate replacement and input vector control approach for leakage current reduction. IEEE Trans. Very Large Scale Integr. Syst. 14(2), 173-182 (2006)
-
(2006)
IEEE Trans. Very Large Scale Integr. Syst
, vol.14
, Issue.2
, pp. 173-182
-
-
Yuan, L.1
Qu, G.2
-
23
-
-
70350513211
-
Trojan hardware - some strategies and defenses
-
Kuhn, M.: Trojan hardware - some strategies and defenses. Slides from the Schloss Dagstuhl (2008), http://www.cl.cam.ac.uk/̃mgk25/dagstuhl08- hwtrojan.pdf
-
(2008)
Slides from the Schloss Dagstuhl
-
-
Kuhn, M.1
-
24
-
-
0034171710
-
Iddq testing for CMOS VLSI
-
Rajsuman, R.: Iddq testing for CMOS VLSI. Proceedings of the IEEE 88(4), 544-568 (2000)
-
(2000)
Proceedings of the IEEE
, vol.88
, Issue.4
, pp. 544-568
-
-
Rajsuman, R.1
|