-
1
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
-
(2010)
IEEE Design & Test of Computers
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
2
-
-
84885619136
-
Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost
-
B. Cha and S. Gupta, "Trojan Detection Via Delay Measurements: A New Approach to Select Paths and Vectors to Maximize Effectiveness and Minimize Cost," in Design Automation and Test in Europe, 2013, pp. 1265-1270.
-
(2013)
Design Automation and Test in Europe
, pp. 1265-1270
-
-
Cha, B.1
Gupta, S.2
-
3
-
-
84890620790
-
Circuit camouflage technology-smi ip protection and anti-tamper technologies
-
S. International, "Circuit Camouflage Technology-SMI IP Protection and Anti-Tamper Technologies," White Paper Version 1. 9. 8j, 2012.
-
(2012)
White Paper Version 1. 9. 8j
-
-
International, S.1
-
4
-
-
84867877630
-
Fault injection attacks on cryptographic devices: Theory, practice and countermeasures
-
A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault Injection Attacks on Cryptographic Devices: Theory, Practice and Countermeasures," Proc. IEEE, vol. 99, 2012.
-
(2012)
Proc. IEEE
, vol.99
-
-
Barenghi, A.1
Breveglieri, L.2
Koren, I.3
Naccache, D.4
-
5
-
-
79958840687
-
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
-
M. Tunstall, D. Mukhopadhyay, and S. Ali, "Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault," LNCS, vol. 6633, pp. pp. 224-233, 2011.
-
(2011)
LNCS
, vol.6633
, pp. 224-233
-
-
Tunstall, M.1
Mukhopadhyay, D.2
Ali, S.3
-
6
-
-
84862119560
-
A fault attack on the led block cipher
-
P. Jovanovic, M. Kreuzer, and I. Polian, "A Fault Attack on the LED Block Cipher," in Int'l Workshop on Constructive Sidechannel Analysis and Secure Design (LNCS 7275), 2012, pp. 120-134.
-
(2012)
Int'l Workshop on Constructive Sidechannel Analysis and Secure Design (LNCS 7275)
, pp. 120-134
-
-
Jovanovic, P.1
Kreuzer, M.2
Polian, I.3
-
7
-
-
84914701954
-
Multi-stage fault attacks on block ciphers
-
P. Jovanovic, M. Kreuzer, and I. Polian, "Multi-Stage Fault Attacks on Block Ciphers," Cryptology ePrint Archive, Report 2013/778, 2013.
-
(2013)
Cryptology EPrint Archive, Report 2013/778
-
-
Jovanovic, P.1
Kreuzer, M.2
Polian, I.3
-
8
-
-
84886900378
-
New differential fault analysis of present
-
N. Bagheri, R. Ebrahimpour, and N. Ghaedi, "New Differential Fault Analysis of PRESENT," EURASIP Journal on Advances in Signal Processing, no. 1, pp. 1-10, 2013.
-
(2013)
EURASIP Journal on Advances in Signal Processing
, Issue.1
, pp. 1-10
-
-
Bagheri, N.1
Ebrahimpour, R.2
Ghaedi, N.3
-
9
-
-
84914708185
-
Differential fault attack on the prince block cipher
-
Report 2013/043
-
L. Song and L. Hu, "Differential Fault Attack on the PRINCE Block Cipher," Cryptology ePrint Archive, Report 2013/043, 2013.
-
(2013)
Cryptology EPrint Archive
-
-
Song, L.1
Hu, L.2
-
10
-
-
31344443130
-
The sorcerer's apprentice guide to fault attacks
-
H. Bar-El et al., "The Sorcerer's Apprentice Guide to Fault Attacks," Proc. IEEE, vol. 94, pp. 370-382, 2006.
-
(2006)
Proc. IEEE
, vol.94
, pp. 370-382
-
-
Bar-El, H.1
-
11
-
-
84890588314
-
Stealthy dopant-level hardware trojans
-
G. Becker, F. Regazzoni, C. Paar, and W. Burleson, "Stealthy Dopant-Level Hardware Trojans," in Cryptographic Hardware and Embedded Systems-CHES 2013, 2013, vol. 8086, pp. 197-214.
-
(2013)
Cryptographic Hardware and Embedded Systems-CHES 2013
, vol.8086
, pp. 197-214
-
-
Becker, G.1
Regazzoni, F.2
Paar, C.3
Burleson, W.4
-
12
-
-
84871538539
-
Prince-a low-latency block cipher for pervasive computing applications
-
X. Wang and K. Sako, Eds. Springer Berlin Heidelberg
-
J. Borghoff et al., "PRINCE-A Low-Latency Block Cipher for Pervasive Computing Applications," in Advances in Cryptology-ASIACRYPT 2012, ser. Lecture Notes in Computer Science, X. Wang and K. Sako, Eds. Springer Berlin Heidelberg, 2012, vol. 7658, pp. 208-225.
-
(2012)
Advances in Cryptology-ASIACRYPT 2012, Ser. Lecture Notes in Computer Science
, vol.7658
, pp. 208-225
-
-
Borghoff, J.1
-
15
-
-
0027808270
-
Very-low-voltage testing for weak cmos logic ics
-
H. Hao and E. McCluskey, "Very-Low-Voltage Testing for Weak CMOS Logic ICs," in Test Conference, 1993. Proceedings., International, 1993, pp. 275-284.
-
(1993)
Test Conference, 1993. Proceedings., International
, pp. 275-284
-
-
Hao, H.1
McCluskey, E.2
-
16
-
-
77955686441
-
Power supply noise: Causes, effects, and testing
-
I. Polian, "Power Supply Noise: Causes, Effects, and Testing," ASP Jour. Low-Power Electronics, vol. 6, no. 2, pp. 326-338, 2010.
-
(2010)
ASP Jour. Low-Power Electronics
, vol.6
, Issue.2
, pp. 326-338
-
-
Polian, I.1
-
17
-
-
52649139737
-
Enabling on-chip switching regulators for multi-core processors using current staggering
-
W. Kim, M. S. Gupta, G.-Y. Wei, and D. M. Brooks, "Enabling On-Chip Switching Regulators for Multi-Core Processors Using Current Staggering," in In Proceedings of the Work. on Architectural Support for Gigascale Integration, 2007.
-
(2007)
Proceedings of the Work. on Architectural Support for Gigascale Integration
-
-
Kim, W.1
Gupta, M.S.2
Wei, G.-Y.3
Brooks, D.M.4
|