-
1
-
-
49749105556
-
-
DATE
-
F. Wolff, C. Papachristou, S. Bhunia and R. S. Chakraborty, Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme, DATE, 2008, pp. 1362-1365.
-
(2008)
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
, pp. 1362-1365
-
-
Wolff, F.1
Papachristou, C.2
Bhunia, S.3
Chakraborty, R.S.4
-
2
-
-
0033309980
-
-
ITC, 1999
-
G. Hetherington, T. Fryars, N. Tamarapalli, M. Kassab, A. Hassan and J. Rajski; Logic BIST for large industrial designs: real issues and case studies, ITC, 1999, pp. 358-367.
-
Logic BIST for Large Industrial Designs: Real Issues and Case Studies
, pp. 358-367
-
-
Hetherington, G.1
Fryars, T.2
Tamarapalli, N.3
Kassab, M.4
Hassan, A.5
Rajski, J.6
-
3
-
-
3042690263
-
The EM sidechannel(s)
-
D. Agarwal, B. Archambeault, J. R. Rao and P. Rohatgi, The EM sidechannel( s), Int. Workshop CHES, 2002, Vol. 2523, pp. 29-45.
-
(2002)
Int. Workshop CHES
, vol.2523
, pp. 29-45
-
-
Agarwal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
0001297528
-
Timing attacks on implantations of diffiehellman, rsa, dss and other systems in Neal Kobitz
-
P. C. Kocher, Timing attacks on implantations of diffiehellman, rsa, dss and other systems in Neal Kobitz, Proc. of CRYPTO, Vol. 1109 of Lecture Notes in Computer Science, pp. 104-113.
-
Proc. of CRYPTO, Vol. 1109 of Lecture Notes in Computer Science
, pp. 104-113
-
-
Kocher, P.C.1
-
5
-
-
37649030695
-
Circuits and design techniques for secure ICs resistant to side-channel attack
-
I. Verbauwhede, K. Tiri, D. Hwang, and P. Schaumont, Circuits and design techniques for secure ICs resistant to side-channel attack, Int. Conf. on IC Design and Technology, 2006, pp. 1-4.
-
(2006)
Int. Conf. on IC Design and Technology
, pp. 1-4
-
-
Verbauwhede, I.1
Tiri, K.2
Hwang, D.3
Schaumont, P.4
-
6
-
-
48149093328
-
Unclonable functions and public-key crypto for FPGA IP protection
-
Physical, Aug.
-
J. Guajardo, S. S. Kumar, G. J. Schrijen and P. Tuyls, Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection, Int. Conf. on Field Prog. Logic and App., Aug. 2007, pp. 189-195.
-
(2007)
Int. Conf. on Field Prog. Logic and App.
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
8
-
-
51849084404
-
Sensitivity analysis to hardware Trojans using power supply transient signals
-
R. Rad, J. Plusquellic and M. Tehranipoor, Sensitivity analysis to hardware Trojans using power supply transient signals, HOST, 2008, pp. 3-7.
-
(2008)
HOST
, pp. 3-7
-
-
Rad, R.1
Plusquellic, J.2
Tehranipoor, M.3
-
9
-
-
62949105376
-
A region based approach for the detection of hardware Trojans
-
M. Banga and M. Hsiao; A Region Based Approach for the Detection of Hardware Trojans, HOST, 2008, pp. 43-50.
-
HOST
-
-
Banga, M.1
Hsiao, M.2
-
10
-
-
62949192896
-
A novel sustained vector technique for the detection of hardware Trojans
-
M. Banga and M. Hsiao; A Novel Sustained Vector Technique for the Detection of Hardware Trojans, VLSI Design, 2009, pp. 327-332.
-
(2009)
VLSI Design
, pp. 327-332
-
-
Banga, M.1
Hsiao, M.2
-
12
-
-
0036949325
-
Fullchip sub-threshold leakage power prediction model for sub-0.18nm CMOS
-
S. Narendra, V. De, S. Borkar, D. Antoniadis, A. Chandrakasan, Fullchip sub-threshold leakage power prediction model for sub-0.18nm CMOS, International Symposium on Low Power Electronics and Design, 2002, pp. 19 - 23.
-
(2002)
International Symposium on Low Power Electronics and Design
, pp. 19-23
-
-
Narendra, S.1
De, V.2
Borkar, S.3
Antoniadis, D.4
Chandrakasan, A.5
|