-
1
-
-
18144420462
-
Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
-
Β. Yang Κ. Wu R. Karri Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard Proc. Int'l Test Conf. (ITC 04) 339 344 Proc. Int'l Test Conf. (ITC 04) 2004
-
(2004)
, pp. 339-344
-
-
Yang, Β.1
Wu, Κ.2
Karri, R.3
-
2
-
-
85177137804
-
-
Dish Net: In House Made with a Locking Script http:// www.satcardsrus.com/dish_net%203m.htm
-
-
-
-
3
-
-
27944506419
-
Secure Scan: A Design-for-Test Architecture for Crypto Chips
-
Β. Yang R. Karri Κ. Wu Secure Scan: A Design-for-Test Architecture for Crypto Chips Proc. 42rid Design Automation Conf. (DAC 05) 135 140 Proc. 42rid Design Automation Conf. (DAC 05) 2005
-
(2005)
, pp. 135-140
-
-
Yang, Β.1
Karri, R.2
Wu, Κ.3
-
4
-
-
33747873451
-
Security Extension for IEEE Std 1149.1
-
F. Novak A. Biasizzo Security Extension for IEEE Std 1149.1 J. Electronic Testing 22 3 301 303 2006
-
(2006)
J. Electronic Testing
, vol.22
, Issue.3
, pp. 301-303
-
-
Novak, F.1
Biasizzo, A.2
-
5
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
G. Suh S. Devadas Physical Unclonable Functions for Device Authentication and Secret Key Generation Proc. 44th Design Automation Conf. (DAC 07) 9 14 Proc. 44th Design Automation Conf. (DAC 07) 2007
-
(2007)
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
6
-
-
85177116402
-
-
Trivium Specifications 2006 ECRYPT Stream Cipher Project
-
(2006)
-
-
-
7
-
-
67349199140
-
Message Authentication in Computationally Constrained Environments
-
Β. Arazi Message Authentication in Computationally Constrained Environments IEEE Trans. Mobile Computing 8 7 968 974 2009
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.7
, pp. 968-974
-
-
Arazi, Β.1
-
8
-
-
85177143746
-
Advances in Cryptology AusCrypt
-
A Fast Cryptographic Check-Sum Algorithm Based on Stream Ciphers Springer-Verlag
-
X. Lai R. Rueppel J. Woollven Advances in Cryptology AusCrypt 339 348 1992 Springer-Verlag A Fast Cryptographic Check-Sum Algorithm Based on Stream Ciphers
-
(1992)
, pp. 339-348
-
-
Lai, X.1
Rueppel, R.2
Woollven, J.3
-
9
-
-
85177119636
-
-
Fwaggle Howto: JTAG Interface on a Dish 3700 Receiver http://www.hungryhacker.com/articles/misc/ dish3700_jtag
-
-
-
Fwaggle1
-
10
-
-
51849095999
-
Hardware Trojan Detection Using Path Delay Fingerprint
-
Y. Jin Y. Makris Hardware Trojan Detection Using Path Delay Fingerprint Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08) 51 57 Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08) 2008
-
(2008)
, pp. 51-57
-
-
Jin, Y.1
Makris, Y.2
|