Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sushmita Kadiyala Rao, Deepak Krishnankutty, Ryan W. Robucci, Nilanjan Banerjee, Chintan Patel |
Post-layout estimation of side-channel power supply signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 92-95, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | I. Wilcox, Fareena Saqib, James F. Plusquellic |
GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 144-150, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Richard Gilmore, Neil Hanley, Máire O'Neill |
Neural network based attack on a masked implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 106-111, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pai-Yu Chen, Runchen Fang, Rui Liu 0005, Chaitali Chakrabarti, Yu Cao 0001, Shimeng Yu |
Exploiting resistive cross-point array for compact design of physical unclonable function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 26-31, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pramod Subramanyan, Sayak Ray, Sharad Malik |
Evaluating the security of logic encryption algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 137-143, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo |
Efficient 2nd-order power analysis on masked devices utilizing multiple leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 118-123, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shamit Ghosh, Dipanwita Roy Chowdhury |
Preventing fault attack on stream cipher using randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 88-91, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth 0001 |
Silent Simon: A threshold implementation under 100 slices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 1-6, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zachary N. Goddard, Nicholas LaJeunesse, Thomas Eisenbarth 0001 |
Power analysis of the t-private logic style for FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 68-71, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage |
High precision fault injections on the instruction cache of ARMv7-M architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 62-67, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Tadeo Ortega Otero, Jonathan Tse, Robert Karmazin, Benjamin Hill 0001, Rajit Manohar |
Automatic obfuscated cell layout for trusted split-foundry design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 56-61, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kan Xiao, Domenic Forte, Mark M. Tehranipoor |
Efficient and secure split manufacturing via obfuscated built-in self-authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 14-19, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nail Etkin Can Akkaya, Burak Erbagci, Raymond Carley, Ken Mai |
A DPA-resistant self-timed three-phase dual-rail pre-charge logic family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 112-117, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Athanasios Papadimitriou, Marios Tampas, David Hély, Vincent Beroulle, Paolo Maistri, Régis Leveugle |
Validation of RTL laser fault injection model with respect to layout information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 78-81, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gedare Bloom, Bhagirath Narahari, Rahul Simha, Ali Namazi, Renato Levy |
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 48-51, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dhiman Saha, Dipanwita Roy Chowdhury |
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 100-105, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Sasdrich, Amir Moradi 0001, Oliver Mischke, Tim Güneysu |
Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 130-136, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Wei Lin, Swaroop Ghosh |
A family of Schmitt-Trigger-based arbiter-PUFs and selective challenge-pruning for robustness and quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 32-37, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ingrid Exurville, Loïc Zussa, Jean-Baptiste Rigaud, Bruno Robisson |
Resilient hardware Trojans detection based on path delay measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 151-156, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chongxi Bao, Yang Xie, Ankur Srivastava 0001 |
A security-aware design scheme for better hardware Trojan detection sensitivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 52-55, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![IEEE Computer Society, 978-1-4673-7420-0 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont |
TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 72-77, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Roarke Horstmeyer, Sid Assawaworrarit, Ulrich Rührmair, Changhuei Yang |
Physically secure and fully reconfigurable data storage using optical scattering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 157-162, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad-Mahdi Bidmeshki, Yiorgos Makris |
Toward automatic proof generation for information flow policies in third-party hardware IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 163-168, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mudit Bhargava, Kaship Sheikh, Ken Mai |
Robust true random number generator using hot-carrier injection balanced metastable sense amplifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 7-13, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofei Guo, Naghmeh Karimi, Francesco Regazzoni 0001, Chenglu Jin, Ramesh Karri |
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 124-129, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meng-Day (Mandel) Yu, Matthias Hiller, Srinivas Devadas |
Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 38-43, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm |
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 82-87, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Georg T. Becker, Alexander Wild, Tim Güneysu |
Security analysis of index-based syndrome coding for PUF-based key generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 20-25, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Franco Stellari, Peilin Song, Alan J. Weger, Jim Culp, A. Herbert, Dirk Pfeiffer |
Verification of untrusted chips using trusted layout and emission measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 19-24, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dylan Ismari, Jim Plusquellic |
IP-level implementation of a resistance-based physical unclonable function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 64-69, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Loïc Zussa, Jean-Max Dutertre, Jessy Clédière, Bruno Robisson |
Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 130-135, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz |
Experimental evaluation of two software countermeasures against fault attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 112-117, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Merrielle Spain, Benjamin Fuller 0001, Kyle Ingols, Robert K. Cunningham |
Robust keys from physical unclonable functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 88-92, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Soll, Thomas Korak, Michael Muehlberghuber, Michael Hutter |
EM-based detection of hardware trojans on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 84-87, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Siva Nishok Dhanuskodi, Arunkumar Vijayakumar, Sandip Kundu |
A Chaotic Ring oscillator based Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 160-165, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raghavan Kumar, Wayne P. Burleson |
On design of a highly secure PUF based on non-linear current mirrors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 38-43, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sava Krstic, Jin Yang 0006, David W. Palmer, Randy B. Osborne, Eran Talmor |
Security of SoC firmware load protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 70-75, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic |
Optimality and beyond: The case of 4×4 S-boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 80-83, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kotaro Okamoto, Naofumi Homma, Takafumi Aoki, Sumio Morioka |
A hierarchical formal approach to verifying side-channel resistant cryptographic processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 76-79, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kaushik Vaidyanathan, Renzhi Liu, Huseyin Ekin Sumbul, Qiuling Zhu, Franz Franchetti, Larry T. Pileggi |
Efficient and secure intellectual property (IP) design with split fabrication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 13-18, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, Jean-Luc Danger |
Side-channel leakage on silicon substrate of CMOS cryptographic chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 32-37, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kan Xiao, Md. Tauhidur Rahman 0001, Domenic Forte, Yu Huang 0005, Mei Su 0002, Mohammad Tehranipoor |
Bit selection algorithm suitable for high-volume production of SRAM-PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 101-106, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Norimasa Yoshimizu |
Hardware trojan detection by symmetry breaking in path delays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 107-111, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Koeberl, Jiangtao Li 0001, Anand Rajan, Wei Wu 0024 |
Entropy loss in PUF-based key generation schemes: The repetition code pitfall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 44-49, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roel Maes, Vincent van der Leest |
Countering the effects of silicon aging on SRAM PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 148-153, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri |
NREPO: Normal basis Recomputing with Permuted Operands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 118-123, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![IEEE Computer Society, 978-1-4799-4114-8 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu, David Naccache, Xuan Thuy Ngo |
Cryptographically secure shields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 25-31, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine |
A frequency leakage model for SCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 97-100, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm |
A look into SIMON from a side-channel perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 56-59, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Meng-Day (Mandel) Yu, David M'Raïhi, Ingrid Verbauwhede, Srinivas Devadas |
A noise bifurcation architecture for linear additive physical functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 124-129, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Gomina, Jean-Baptiste Rigaud, Philippe Gendrier, Philippe Candelier, Assia Tria |
Power supply glitch attacks: Design and evaluation of detection circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 136-141, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sk Subidh Ali, Ozgur Sinanoglu, Samah Mohamed Saeed, Ramesh Karri |
New scan attacks against state-of-the-art countermeasures and DFT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 142-147, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kaushik Vaidyanathan, Bishnu Prasad Das, Huseyin Ekin Sumbul, Renzhi Liu, Larry T. Pileggi |
Building trusted ICs using split fabrication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 1-6, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria |
Increasing the efficiency of laser fault injections using fast gate level reverse engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 60-63, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mostafa M. I. Taha, Patrick Schaumont |
Side-channel countermeasure for SHA-3 at almost-zero area overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 93-96, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anirudh Iyengar, Kenneth Ramclam, Swaroop Ghosh |
DWM-PUF: A low-overhead, memory-based security primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 154-159, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Meenatchi Jagasivamani, Peter Gadfort, Michel Sika, Michael Bajura, Michael Fritze |
Split-fabrication obfuscation: Metrics and techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 7-12, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor |
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pp. 50-55, 2014, IEEE Computer Society, 978-1-4799-4114-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0046, Qiang Xu 0001 |
On hardware Trojan design and implementation at register-transfer level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 107-112, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Philip Hodgers, Neil Hanley, Máire O'Neill |
Pre-processing power traces with a phase-sensitive detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 131-136, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Filippo Melzani, Andrea Palomba |
Enhancing fault sensitivity analysis through templates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 25-28, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yier Jin, Bo Yang, Yiorgos Makris |
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 99-106, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeroen Delvaux, Ingrid Verbauwhede |
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 137-142, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mark D. Aagaard, Guang Gong, Rajesh K. Mota |
Hardware implementations of the WG-5 cipher for passive RFID tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 29-34, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wenchao Li 0001, Adrià Gascón, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari 0001, Sharad Malik, Natarajan Shankar, Sanjit A. Seshia |
WordRev: Finding word-level structures in a sea of bit-level gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 67-74, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aydin Aysu, Cameron Patterson, Patrick Schaumont |
Low-cost and area-efficient FPGA implementations of lattice-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 81-86, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Possamai Bastos, Frank Sill Torres, Jean-Max Dutertre, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre |
A bulk built-in sensor for detection of fault attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 51-54, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Li Li 0021, Hai Zhou 0001 |
Structural transformation for best-possible obfuscation of sequential circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 55-60, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jim Aarestad, Jim Plusquellic, Dhruva Acharyya |
Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 151-158, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Indrasish Saha, Ratan Rahul Jeldi, Rajat Subhra Chakraborty |
Model building attacks on Physically Unclonable Functions using genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 41-44, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vikram B. Suresh, Daniele Antonioli, Wayne P. Burleson |
On-chip lightweight implementation of reduced NIST randomness test suite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 93-98, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cyril Roscian, Jean-Max Dutertre, Assia Tria |
Frontside laser fault injection on cryptosystems - Application to the AES' last round -. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 119-124, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![IEEE Computer Society, 978-1-4799-0559-1 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Mostafa M. I. Taha, Patrick Schaumont |
Side-Channel Analysis of MAC-Keccak. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 125-130, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sheng Wei 0001, Miodrag Potkonjak |
Malicious circuitry detection using fast timing characterization via test points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 113-118, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | J. Ju, Ray Chakraborty, Charles Lamech, Jim Plusquellic |
Stability analysis of a physical unclonable function based on metal resistance variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 143-150, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mukund Kalyanaraman, Michael Orshansky |
Novel strong PUF based on nonlinearity of MOSFET subthreshold operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 13-18, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 |
Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 87-92, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kan Xiao, Mohammad Tehranipoor |
BISA: Built-in self-authentication for preventing hardware Trojan insertion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 45-50, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mafalda Cortez, Said Hamdioui, Vincent van der Leest, Roel Maes, Geert Jan Schrijen |
Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 35-40, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David W. Palmer, Parbati Kumar Manna |
An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 61-66, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Helfmeier, Christian Boit, Dmitry Nedospasov, Jean-Pierre Seifert |
Cloning Physically Unclonable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 1-6, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stéphanie Kerckhof, François Durvaux, François-Xavier Standaert, Benoît Gérard |
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 7-12, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Merli, Johann Heyszl, Benedikt Heinz, Dieter Schuster, Frederic Stumpf, Georg Sigl |
Localized electromagnetic analysis of RO PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 19-24, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Obaid Khalid, Carsten Rolfes, Andreas Ibing |
On implementing trusted boot for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 75-80, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede |
A systematic M safe-error detection in hardware implementations of cryptographic algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 96-101, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Manich, Markus S. Wamser, Georg Sigl |
Detection of probing attempts in secure ICs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 134-139, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Lewandowski, Richard Meana, Matthew Morrison, Srinivas Katkoori |
A novel method for watermarking sequential circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 21-24, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Meng-Day (Mandel) Yu, Richard Sowell, Alok Singh 0003, David M'Raïhi, Srinivas Devadas |
Performance metrics and empirical results of a PUF cryptographic key generation ASIC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 108-115, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Houssem Maghrebi, Sylvain Guilley, Emmanuel Prouff, Jean-Luc Danger |
Register leakage masking using Gray code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 37-42, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed M. Farag, Lee W. Lerner, Cameron D. Patterson |
Interacting with Hardware Trojans over a network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 69-74, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Zohner, Marc Stöttinger, Sorin A. Huss, Oliver Stein |
An adaptable, modular, and autonomous side-channel vulnerability evaluator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 43-48, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wenchao Li 0001, Zach Wasson, Sanjit A. Seshia |
Reverse engineering circuits using behavioral pattern mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 83-88, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jing Ju, Jim Plusquellic, Raj Chakraborty, Reza M. Rad |
Bit string analysis of Physical Unclonable Functions based on resistance variations in metals and transistors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 13-20, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hareesh Khattri, Kumar V. Mangipudi, Salvador Mandujano |
HSDL: A Security Development Lifecycle for hardware technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 116-121, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0046, Haile Yu, Qiang Xu 0001 |
HTOutlier: Hardware Trojan detection with side-channel signature outlier identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 55-58, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Charles Lamech, Jim Plusquellic |
Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 75-82, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta, Assia Tria, Thierry Vaschalde |
Fault Round Modification Analysis of the advanced encryption standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 140-145, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|