The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HOST"( http://dblp.L3S.de/Venues/HOST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/host

Publication years (Num. hits)
2008 (23) 2009 (18) 2010 (25) 2011 (31) 2012 (26) 2013 (27) 2014 (31) 2015 (31) 2016 (45) 2017 (49) 2018 (40) 2019 (26) 2020 (31) 2021 (29) 2022 (47) 2023 (31)
Publication types (Num. hits)
inproceedings(494) proceedings(16)
Venues (Conferences, Journals, ...)
HOST(510)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sushmita Kadiyala Rao, Deepak Krishnankutty, Ryan W. Robucci, Nilanjan Banerjee, Chintan Patel Post-layout estimation of side-channel power supply signatures. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1I. Wilcox, Fareena Saqib, James F. Plusquellic GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Richard Gilmore, Neil Hanley, Máire O'Neill Neural network based attack on a masked implementation of AES. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pai-Yu Chen, Runchen Fang, Rui Liu 0005, Chaitali Chakrabarti, Yu Cao 0001, Shimeng Yu Exploiting resistive cross-point array for compact design of physical unclonable function. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pramod Subramanyan, Sayak Ray, Sharad Malik Evaluating the security of logic encryption algorithms. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo Efficient 2nd-order power analysis on masked devices utilizing multiple leakage. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shamit Ghosh, Dipanwita Roy Chowdhury Preventing fault attack on stream cipher using randomization. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth 0001 Silent Simon: A threshold implementation under 100 slices. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zachary N. Goddard, Nicholas LaJeunesse, Thomas Eisenbarth 0001 Power analysis of the t-private logic style for FPGAs. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage High precision fault injections on the instruction cache of ARMv7-M architectures. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos Tadeo Ortega Otero, Jonathan Tse, Robert Karmazin, Benjamin Hill 0001, Rajit Manohar Automatic obfuscated cell layout for trusted split-foundry design. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kan Xiao, Domenic Forte, Mark M. Tehranipoor Efficient and secure split manufacturing via obfuscated built-in self-authentication. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nail Etkin Can Akkaya, Burak Erbagci, Raymond Carley, Ken Mai A DPA-resistant self-timed three-phase dual-rail pre-charge logic family. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Athanasios Papadimitriou, Marios Tampas, David Hély, Vincent Beroulle, Paolo Maistri, Régis Leveugle Validation of RTL laser fault injection model with respect to layout information. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gedare Bloom, Bhagirath Narahari, Rahul Simha, Ali Namazi, Renato Levy FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dhiman Saha, Dipanwita Roy Chowdhury Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pascal Sasdrich, Amir Moradi 0001, Oliver Mischke, Tim Güneysu Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cheng-Wei Lin, Swaroop Ghosh A family of Schmitt-Trigger-based arbiter-PUFs and selective challenge-pruning for robustness and quality. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ingrid Exurville, Loïc Zussa, Jean-Baptiste Rigaud, Bruno Robisson Resilient hardware Trojans detection based on path delay measurements. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chongxi Bao, Yang Xie, Ankur Srivastava 0001 A security-aware design scheme for better hardware Trojan detection sensitivity. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 Search on Bibsonomy HOST The full citation details ... 2015 DBLP  BibTeX  RDF
1Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roarke Horstmeyer, Sid Assawaworrarit, Ulrich Rührmair, Changhuei Yang Physically secure and fully reconfigurable data storage using optical scattering. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad-Mahdi Bidmeshki, Yiorgos Makris Toward automatic proof generation for information flow policies in third-party hardware IP. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mudit Bhargava, Kaship Sheikh, Ken Mai Robust true random number generator using hot-carrier injection balanced metastable sense amplifiers. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaofei Guo, Naghmeh Karimi, Francesco Regazzoni 0001, Chenglu Jin, Ramesh Karri Simulation and analysis of negative-bias temperature instability aging on power analysis attacks. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meng-Day (Mandel) Yu, Matthias Hiller, Srinivas Devadas Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Georg T. Becker, Alexander Wild, Tim Güneysu Security analysis of index-based syndrome coding for PUF-based key generation. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Franco Stellari, Peilin Song, Alan J. Weger, Jim Culp, A. Herbert, Dirk Pfeiffer Verification of untrusted chips using trusted layout and emission measurements. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dylan Ismari, Jim Plusquellic IP-level implementation of a resistance-based physical unclonable function. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Loïc Zussa, Jean-Max Dutertre, Jessy Clédière, Bruno Robisson Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz Experimental evaluation of two software countermeasures against fault attacks. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Merrielle Spain, Benjamin Fuller 0001, Kyle Ingols, Robert K. Cunningham Robust keys from physical unclonable functions. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Oliver Soll, Thomas Korak, Michael Muehlberghuber, Michael Hutter EM-based detection of hardware trojans on FPGAs. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Siva Nishok Dhanuskodi, Arunkumar Vijayakumar, Sandip Kundu A Chaotic Ring oscillator based Random Number Generator. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raghavan Kumar, Wayne P. Burleson On design of a highly secure PUF based on non-linear current mirrors. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sava Krstic, Jin Yang 0006, David W. Palmer, Randy B. Osborne, Eran Talmor Security of SoC firmware load protocols. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic Optimality and beyond: The case of 4×4 S-boxes. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kotaro Okamoto, Naofumi Homma, Takafumi Aoki, Sumio Morioka A hierarchical formal approach to verifying side-channel resistant cryptographic processors. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaushik Vaidyanathan, Renzhi Liu, Huseyin Ekin Sumbul, Qiuling Zhu, Franz Franchetti, Larry T. Pileggi Efficient and secure intellectual property (IP) design with split fabrication. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, Jean-Luc Danger Side-channel leakage on silicon substrate of CMOS cryptographic chip. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kan Xiao, Md. Tauhidur Rahman 0001, Domenic Forte, Yu Huang 0005, Mei Su 0002, Mohammad Tehranipoor Bit selection algorithm suitable for high-volume production of SRAM-PUF. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Norimasa Yoshimizu Hardware trojan detection by symmetry breaking in path delays. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Patrick Koeberl, Jiangtao Li 0001, Anand Rajan, Wei Wu 0024 Entropy loss in PUF-based key generation schemes: The repetition code pitfall. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Roel Maes, Vincent van der Leest Countering the effects of silicon aging on SRAM PUFs. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri NREPO: Normal basis Recomputing with Permuted Operands. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014 Search on Bibsonomy HOST The full citation details ... 2014 DBLP  BibTeX  RDF
1Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu, David Naccache, Xuan Thuy Ngo Cryptographically secure shields. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine A frequency leakage model for SCA. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm A look into SIMON from a side-channel perspective. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Meng-Day (Mandel) Yu, David M'Raïhi, Ingrid Verbauwhede, Srinivas Devadas A noise bifurcation architecture for linear additive physical functions. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kamil Gomina, Jean-Baptiste Rigaud, Philippe Gendrier, Philippe Candelier, Assia Tria Power supply glitch attacks: Design and evaluation of detection circuits. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sk Subidh Ali, Ozgur Sinanoglu, Samah Mohamed Saeed, Ramesh Karri New scan attacks against state-of-the-art countermeasures and DFT. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaushik Vaidyanathan, Bishnu Prasad Das, Huseyin Ekin Sumbul, Renzhi Liu, Larry T. Pileggi Building trusted ICs using split fabrication. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria Increasing the efficiency of laser fault injections using fast gate level reverse engineering. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mostafa M. I. Taha, Patrick Schaumont Side-channel countermeasure for SHA-3 at almost-zero area overhead. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anirudh Iyengar, Kenneth Ramclam, Swaroop Ghosh DWM-PUF: A low-overhead, memory-based security primitive. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Meenatchi Jagasivamani, Peter Gadfort, Michel Sika, Michael Bajura, Michael Fritze Split-fabrication obfuscation: Metrics and techniques. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jie Zhang 0046, Qiang Xu 0001 On hardware Trojan design and implementation at register-transfer level. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Philip Hodgers, Neil Hanley, Máire O'Neill Pre-processing power traces with a phase-sensitive detector. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Filippo Melzani, Andrea Palomba Enhancing fault sensitivity analysis through templates. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yier Jin, Bo Yang, Yiorgos Makris Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeroen Delvaux, Ingrid Verbauwhede Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mark D. Aagaard, Guang Gong, Rajesh K. Mota Hardware implementations of the WG-5 cipher for passive RFID tags. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wenchao Li 0001, Adrià Gascón, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari 0001, Sharad Malik, Natarajan Shankar, Sanjit A. Seshia WordRev: Finding word-level structures in a sea of bit-level gates. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aydin Aysu, Cameron Patterson, Patrick Schaumont Low-cost and area-efficient FPGA implementations of lattice-based cryptography. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rodrigo Possamai Bastos, Frank Sill Torres, Jean-Max Dutertre, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre A bulk built-in sensor for detection of fault attacks. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Li Li 0021, Hai Zhou 0001 Structural transformation for best-possible obfuscation of sequential circuits. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jim Aarestad, Jim Plusquellic, Dhruva Acharyya Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUF. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Indrasish Saha, Ratan Rahul Jeldi, Rajat Subhra Chakraborty Model building attacks on Physically Unclonable Functions using genetic programming. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vikram B. Suresh, Daniele Antonioli, Wayne P. Burleson On-chip lightweight implementation of reduced NIST randomness test suite. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cyril Roscian, Jean-Max Dutertre, Assia Tria Frontside laser fault injection on cryptosystems - Application to the AES' last round -. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013 Search on Bibsonomy HOST The full citation details ... 2013 DBLP  BibTeX  RDF
1Mostafa M. I. Taha, Patrick Schaumont Side-Channel Analysis of MAC-Keccak. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sheng Wei 0001, Miodrag Potkonjak Malicious circuitry detection using fast timing characterization via test points. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1J. Ju, Ray Chakraborty, Charles Lamech, Jim Plusquellic Stability analysis of a physical unclonable function based on metal resistance variations. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mukund Kalyanaraman, Michael Orshansky Novel strong PUF based on nonlinearity of MOSFET subthreshold operation. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kan Xiao, Mohammad Tehranipoor BISA: Built-in self-authentication for preventing hardware Trojan insertion. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mafalda Cortez, Said Hamdioui, Vincent van der Leest, Roel Maes, Geert Jan Schrijen Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David W. Palmer, Parbati Kumar Manna An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designs. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Clemens Helfmeier, Christian Boit, Dmitry Nedospasov, Jean-Pierre Seifert Cloning Physically Unclonable Functions. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stéphanie Kerckhof, François Durvaux, François-Xavier Standaert, Benoît Gérard Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dominik Merli, Johann Heyszl, Benedikt Heinz, Dieter Schuster, Frederic Stumpf, Georg Sigl Localized electromagnetic analysis of RO PUFs. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Obaid Khalid, Carsten Rolfes, Andreas Ibing On implementing trusted boot for embedded systems. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede A systematic M safe-error detection in hardware implementations of cryptographic algorithms. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Salvador Manich, Markus S. Wamser, Georg Sigl Detection of probing attempts in secure ICs. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matthew Lewandowski, Richard Meana, Matthew Morrison, Srinivas Katkoori A novel method for watermarking sequential circuits. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Meng-Day (Mandel) Yu, Richard Sowell, Alok Singh 0003, David M'Raïhi, Srinivas Devadas Performance metrics and empirical results of a PUF cryptographic key generation ASIC. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Sylvain Guilley, Emmanuel Prouff, Jean-Luc Danger Register leakage masking using Gray code. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammed M. Farag, Lee W. Lerner, Cameron D. Patterson Interacting with Hardware Trojans over a network. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Zohner, Marc Stöttinger, Sorin A. Huss, Oliver Stein An adaptable, modular, and autonomous side-channel vulnerability evaluator. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wenchao Li 0001, Zach Wasson, Sanjit A. Seshia Reverse engineering circuits using behavioral pattern mining. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jing Ju, Jim Plusquellic, Raj Chakraborty, Reza M. Rad Bit string analysis of Physical Unclonable Functions based on resistance variations in metals and transistors. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hareesh Khattri, Kumar V. Mangipudi, Salvador Mandujano HSDL: A Security Development Lifecycle for hardware technologies. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jie Zhang 0046, Haile Yu, Qiang Xu 0001 HTOutlier: Hardware Trojan detection with side-channel signature outlier identification. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Charles Lamech, Jim Plusquellic Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta, Assia Tria, Thierry Vaschalde Fault Round Modification Analysis of the advanced encryption standard. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 510 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license