Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun |
FPGA based trustworthy authentication technique using Physically Unclonable Functions and artificial intelligence. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Rozic, Wim Dehaene, Ingrid Verbauwhede |
Design solutions for securing SRAM cell against power analysis. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter 0001, Johannes Buchmann 0001 |
Improved algebraic side-channel attack on AES. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jungmin Park, Akhilesh Tyagi |
t-Private logic synthesis on FPGAs. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Simons, Erik van der Sluis, Vincent van der Leest |
Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Hiller, Dominik Merli, Frederic Stumpf, Georg Sigl |
Complementary IBS: Application specific error correction for PUFs. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012 |
HOST |
2012 |
DBLP BibTeX RDF |
|
1 | Clemens Helfmeier, Christian Boit, Uwe Kerst |
On charge sensors for FIB attack detection. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmi Narasimhan Ramakrishnan, Manoj Chakkaravarthy, Antarpreet Singh Manchanda, Mike Borowczak, Ranga Vemuri |
SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bilzor, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin |
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amir Moradi 0001, Oliver Mischke |
Glitch-free implementation of masking in modern FPGAs. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Nedospasov, Jean-Pierre Seifert, Alexander Schlösser, Susanna Orlic |
Functional integrated circuit analysis. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mudit Bhargava, Cagla Cakir, Ken Mai |
Reliability enhancement of bi-stable PUFs in 65nm bulk CMOS. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peilin Song, Franco Stellari, Dirk Pfeiffer, Jim Culp, Alan J. Weger, Alyssa Bonnoit, Bob Wisnieff, Marc Taubenblatt |
MARVEL - Malicious alteration recognition and verification by emission of light. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | |
HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA |
HOST |
2011 |
DBLP BibTeX RDF |
|
1 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Denis Réal |
Performance evaluation of protocols resilient to physical attacks. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Feller 0002, Sunil Malipatlolla, David Meister, Sorin A. Huss |
TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Gotze |
A survey of frequently identified vulnerabilities in commercial computing semiconductors. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nachiketh R. Potlapally |
Hardware security in practice: Challenges and opportunities. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Helena Handschuh |
Hardware intrinsic security based on SRAM PUFs: Tales from the industry. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Akihiro T. Sasaki, Yohei Hori, Akashi Satoh |
A fast power current analysis methodology using capacitor charging model for side channel attack evaluation. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Katsuhiko Iwai, Mitsuru Shiozaki, Anh-Tuan Hoang, Kenji Kojima, Takeshi Fujino |
Implementation and verification of DPA-resistant cryptographic DES circuit using Domino-RSL. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mathilde Soucarros, Cécile Canovas-Dumas, Jessy Clédière, Philippe Elbaz-Vincent, Denis Réal |
Influence of the temperature on true random number generators. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiasi Luo, Yunsi Fei |
Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger |
Formal security evaluation of hardware Boolean masking against second-order attacks. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Luis Angel D. Bathen, Nikil D. Dutt |
TrustGeM: Dynamic trusted environment generation for chip-multiprocessors. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede |
Systematic security evaluation method against C safe-error attacks. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bilzor, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin |
Security Checkers: Detecting processor malicious inclusions at runtime. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raghavan Kumar, Harikrishnan Kumarapillai Chandrikakutty, Sandip Kundu |
On improving reliability of delay based Physically Unclonable Functions under temperature variations. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zdenek Sid Paral, Srinivas Devadas |
Reliable and efficient PUF-based key generation using pattern matching. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stephen M. Papa, William D. Casper, Suku Nair |
Placement of trust anchors in embedded computer systems. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qingqing Chen 0004, György Csaba, Paolo Lugli, Ulf Schlichtmann, Ulrich Rührmair |
The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yang Li 0001, Kazuo Ohta, Kazuo Sakiyama |
Revisit fault sensitivity analysis on WDDL-AES. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia |
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jean DaRolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre |
New security threats against chips containing scan chain structures. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach |
Low-cost recovery for the code integrity protection in secure embedded processors. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sumio Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura 0002, Kazue Sako |
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Victor Costan, Srinivas Devadas |
Security challenges and opportunities in adaptive and reconfigurable hardware. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuehui Zhang, Mohammad Tehranipoor |
Case study: Detecting hardware Trojans in third-party digital IP cores. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mainak Banga, Michael S. Hsiao |
ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amir Moradi 0001, Oliver Mischke, Christof Paar |
Practical evaluation of DPA countermeasures on reconfigurable hardware. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Armin Krieg, Christian Bachmann, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Josef Haid |
Accelerating early design phase differential power analysis using power emulation techniques. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eric Love, Yier Jin, Yiorgos Makris |
Enhancing security via provably trustworthy hardware intellectual property. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Guido Bertoni, Andrea Palomba, Ruggero Susella |
A novel fault attack against ECDSA. |
HOST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Georg T. Becker, Markus Kasper, Amir Moradi 0001, Christof Paar |
Side-channel based Watermarks for Integrated Circuits. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks |
FPGA Implementations of the Hummingbird Cryptographic Algorithm. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy 0001, Swarup Bhunia |
Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Craig Teegarden, Mudit Bhargava, Ken Mai |
Side-channel Attack Resistant ROM-based AES S-Box. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chi-En Daniel Yin, Gang Qu 0001 |
LISA: Maximizing RO PUF's Secret Extraction. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mudit Bhargava, Cagla Cakir, Ken Mai |
Attack Resistant Sense Amplifier based PUFs (SA-PUF) with Deterministic and Controllable Reliability of PUF Responses. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vikram B. Suresh, Wayne P. Burleson |
Entropy Extraction in Metastability-based TRNG. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ekarat Laohavaleeson, Chintan Patel |
Current Flattening Circuit for DPA Countermeasure. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, Ramesh Karri |
SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eric Menendez, Ken Mai |
A Comparison of Power-analysis-resistant Digital Circuits. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Ziener, Florian Baueregger, Jürgen Teich |
Multiplexing Methods for Power Watermarking. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christopher J. Clark |
Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuyuki Tanimura, Nikil D. Dutt |
ExCCel: Exploration of Complementary Cells for Efficient DPA Attack Resistivity. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Farinaz Koushanfar, Yousra Alkabani |
Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament |
Entropy-based Power Attack. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi |
Low Voltage Fault Attacks to AES. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Fan, Xu Guo 0001, Elke De Mulder, Patrick Schaumont, Bart Preneel, Ingrid Verbauwhede |
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johann Heyszl, Frederic Stumpf |
Efficient One-pass Entity Authentication based on ECC for Constrained Devices. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abhranil Maiti, Jeff Casarona, Luke McHale, Patrick Schaumont |
A Large Scale Characterization of RO-PUF. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh |
Prototyping Platform for Performance Evaluation of SHA-3 Candidates. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Akashi Satoh, Toshihiro Katashita, Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki |
Hardware Implementations of Hash Function Luffa. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Newgard, Colby Hoffman |
Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance Applications. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mainak Banga, Michael S. Hsiao |
Trusted RTL: Trojan Detection Methodology in Pre-silicon Designs. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jim Plusquellic, Ken Mai (eds.) |
HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, USA |
HOST |
2010 |
DBLP BibTeX RDF |
|
1 | Kurt Rosenfeld, Efstratios Gavas, Ramesh Karri |
Sensor Physical Unclonable Functions. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede |
Analysis and Design of Active IC Metering Schemes. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Vignesh Vivekraja, Leyla Nazhandali |
Circuit Level Techniques for Reliable Physically Uncloneable Functions. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sergei P. Skorobogatov |
Local Heating Attacks on Flash Memory Devices. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Devendra Rai, John C. Lach |
Performance of Delay-Based Trojan Detection Techniques under Parameter Variations. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Candore, Övünç Kocabas, Farinaz Koushanfar |
Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gedare Bloom, Bhagirath Narahari, Rahul Simha |
OS Support for Detecting Trojan Circuit Attacks. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls |
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yier Jin, Nathan Kupp, Yiorgos Makris |
Experiences in Hardware Trojan Design and Implementation. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Tehranipoor, Jim Plusquellic (eds.) |
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings |
HOST |
2009 |
DBLP BibTeX RDF |
|
1 | Zhimin Chen 0002, Patrick Schaumont |
Extended Abstract: Early Feedback on Side-Channel Risks with Accelerated Toggle-Counting. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane |
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic |
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gang Qu 0001 |
Temperature-Aware Cooperative Ring Oscillator PUF. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rajat Subhra Chakraborty, Swarup Bhunia |
Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David R. McIntyre, Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia |
Dynamic Evaluation of Hardware Trust. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guilhem Castagnos, Alexandre Berzati, Cécile Canovas, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier, Stephanie Salgado |
Fault Analysis of Grain-128. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar, Christof Paar |
Secure IP-Block Distribution for Hardware Devices. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mainak Banga, Michael S. Hsiao |
VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dean Collins |
TRUST in Integrated Circuits and 3rd Party IP. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Malcolm Taylor, Chi-En Daniel Yin, Min Wu, Gang Qu 0001 |
A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing Systems. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov |
Circuit CAD Tools as a Security Threat. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Schutz |
The Role of Platform Integrity in Trustworthy Systems. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ted Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine |
Trustworthy System Security through 3-D Integrated Hardware. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Francis G. Wolff, Christos A. Papachristou |
An Embedded Flash Memory Vault for Software Trojan Protection. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhimin Chen 0002, Patrick Schaumont |
Slicing Up a Perfect Hardware Masking Scheme. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Fan, Ingrid Verbauwhede |
Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2m). |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Reza M. Rad, Jim Plusquellic, Mohammad Tehranipoor |
Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep S. Kumar, Jorge Guajardo, Roel Maes, Geert Jan Schrijen, Pim Tuyls |
The Butterfly PUF: Protecting IP on every FPGA. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic |
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia |
On-Demand Transparency for Improving Hardware Trojan Detectability. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yousra Alkabani, Farinaz Koushanfar |
Designer's Hardware Trojan Horse. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|