The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HOST"( http://dblp.L3S.de/Venues/HOST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/host

Publication years (Num. hits)
2008 (23) 2009 (18) 2010 (25) 2011 (31) 2012 (26) 2013 (27) 2014 (31) 2015 (31) 2016 (45) 2017 (49) 2018 (40) 2019 (26) 2020 (31) 2021 (29) 2022 (47) 2023 (31)
Publication types (Num. hits)
inproceedings(494) proceedings(16)
Venues (Conferences, Journals, ...)
HOST(510)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun FPGA based trustworthy authentication technique using Physically Unclonable Functions and artificial intelligence. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vladimir Rozic, Wim Dehaene, Ingrid Verbauwhede Design solutions for securing SRAM cell against power analysis. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter 0001, Johannes Buchmann 0001 Improved algebraic side-channel attack on AES. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jungmin Park, Akhilesh Tyagi t-Private logic synthesis on FPGAs. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter Simons, Erik van der Sluis, Vincent van der Leest Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matthias Hiller, Dominik Merli, Frederic Stumpf, Georg Sigl Complementary IBS: Application specific error correction for PUFs. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012 Search on Bibsonomy HOST The full citation details ... 2012 DBLP  BibTeX  RDF
1Clemens Helfmeier, Christian Boit, Uwe Kerst On charge sensors for FIB attack detection. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lakshmi Narasimhan Ramakrishnan, Manoj Chakkaravarthy, Antarpreet Singh Manchanda, Mike Borowczak, Ranga Vemuri SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Bilzor, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Oliver Mischke Glitch-free implementation of masking in modern FPGAs. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dmitry Nedospasov, Jean-Pierre Seifert, Alexander Schlösser, Susanna Orlic Functional integrated circuit analysis. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mudit Bhargava, Cagla Cakir, Ken Mai Reliability enhancement of bi-stable PUFs in 65nm bulk CMOS. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peilin Song, Franco Stellari, Dirk Pfeiffer, Jim Culp, Alan J. Weger, Alyssa Bonnoit, Bob Wisnieff, Marc Taubenblatt MARVEL - Malicious alteration recognition and verification by emission of light. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1 HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA Search on Bibsonomy HOST The full citation details ... 2011 DBLP  BibTeX  RDF
1Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Denis Réal Performance evaluation of protocols resilient to physical attacks. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas Feller 0002, Sunil Malipatlolla, David Meister, Sorin A. Huss TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kevin Gotze A survey of frequently identified vulnerabilities in commercial computing semiconductors. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nachiketh R. Potlapally Hardware security in practice: Challenges and opportunities. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Helena Handschuh Hardware intrinsic security based on SRAM PUFs: Tales from the industry. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Akihiro T. Sasaki, Yohei Hori, Akashi Satoh A fast power current analysis methodology using capacitor charging model for side channel attack evaluation. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Katsuhiko Iwai, Mitsuru Shiozaki, Anh-Tuan Hoang, Kenji Kojima, Takeshi Fujino Implementation and verification of DPA-resistant cryptographic DES circuit using Domino-RSL. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mathilde Soucarros, Cécile Canovas-Dumas, Jessy Clédière, Philippe Elbaz-Vincent, Denis Réal Influence of the temperature on true random number generators. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qiasi Luo, Yunsi Fei Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger Formal security evaluation of hardware Boolean masking against second-order attacks. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Luis Angel D. Bathen, Nikil D. Dutt TrustGeM: Dynamic trusted environment generation for chip-multiprocessors. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede Systematic security evaluation method against C safe-error attacks. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Bilzor, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin Security Checkers: Detecting processor malicious inclusions at runtime. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Raghavan Kumar, Harikrishnan Kumarapillai Chandrikakutty, Sandip Kundu On improving reliability of delay based Physically Unclonable Functions under temperature variations. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zdenek Sid Paral, Srinivas Devadas Reliable and efficient PUF-based key generation using pattern matching. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephen M. Papa, William D. Casper, Suku Nair Placement of trust anchors in embedded computer systems. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qingqing Chen 0004, György Csaba, Paolo Lugli, Ulf Schlichtmann, Ulrich Rührmair The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yang Li 0001, Kazuo Ohta, Kazuo Sakiyama Revisit fault sensitivity analysis on WDDL-AES. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jean DaRolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre New security threats against chips containing scan chain structures. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach Low-cost recovery for the code integrity protection in secure embedded processors. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sumio Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura 0002, Kazue Sako Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Victor Costan, Srinivas Devadas Security challenges and opportunities in adaptive and reconfigurable hardware. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xuehui Zhang, Mohammad Tehranipoor Case study: Detecting hardware Trojans in third-party digital IP cores. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mainak Banga, Michael S. Hsiao ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Oliver Mischke, Christof Paar Practical evaluation of DPA countermeasures on reconfigurable hardware. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Armin Krieg, Christian Bachmann, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Josef Haid Accelerating early design phase differential power analysis using power emulation techniques. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eric Love, Yier Jin, Yiorgos Makris Enhancing security via provably trustworthy hardware intellectual property. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Guido Bertoni, Andrea Palomba, Ruggero Susella A novel fault attack against ECDSA. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Georg T. Becker, Markus Kasper, Amir Moradi 0001, Christof Paar Side-channel based Watermarks for Integrated Circuits. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks FPGA Implementations of the Hummingbird Cryptographic Algorithm. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Seetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy 0001, Swarup Bhunia Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Craig Teegarden, Mudit Bhargava, Ken Mai Side-channel Attack Resistant ROM-based AES S-Box. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chi-En Daniel Yin, Gang Qu 0001 LISA: Maximizing RO PUF's Secret Extraction. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mudit Bhargava, Cagla Cakir, Ken Mai Attack Resistant Sense Amplifier based PUFs (SA-PUF) with Deterministic and Controllable Reliability of PUF Responses. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vikram B. Suresh, Wayne P. Burleson Entropy Extraction in Metastability-based TRNG. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ekarat Laohavaleeson, Chintan Patel Current Flattening Circuit for DPA Countermeasure. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, Ramesh Karri SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eric Menendez, Ken Mai A Comparison of Power-analysis-resistant Digital Circuits. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel Ziener, Florian Baueregger, Jürgen Teich Multiplexing Methods for Power Watermarking. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christopher J. Clark Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuyuki Tanimura, Nikil D. Dutt ExCCel: Exploration of Complementary Cells for Efficient DPA Attack Resistivity. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Farinaz Koushanfar, Yousra Alkabani Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament Entropy-based Power Attack. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi Low Voltage Fault Attacks to AES. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Xu Guo 0001, Elke De Mulder, Patrick Schaumont, Bart Preneel, Ingrid Verbauwhede State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johann Heyszl, Frederic Stumpf Efficient One-pass Entity Authentication based on ECC for Constrained Devices. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abhranil Maiti, Jeff Casarona, Luke McHale, Patrick Schaumont A Large Scale Characterization of RO-PUF. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh Prototyping Platform for Performance Evaluation of SHA-3 Candidates. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Akashi Satoh, Toshihiro Katashita, Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki Hardware Implementations of Hash Function Luffa. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bruce Newgard, Colby Hoffman Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance Applications. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mainak Banga, Michael S. Hsiao Trusted RTL: Trojan Detection Methodology in Pre-silicon Designs. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jim Plusquellic, Ken Mai (eds.) HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, USA Search on Bibsonomy HOST The full citation details ... 2010 DBLP  BibTeX  RDF
1Kurt Rosenfeld, Efstratios Gavas, Ramesh Karri Sensor Physical Unclonable Functions. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede Analysis and Design of Active IC Metering Schemes. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vignesh Vivekraja, Leyla Nazhandali Circuit Level Techniques for Reliable Physically Uncloneable Functions. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sergei P. Skorobogatov Local Heating Attacks on Flash Memory Devices. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Devendra Rai, John C. Lach Performance of Delay-Based Trojan Detection Techniques under Parameter Variations. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andrea Candore, Övünç Kocabas, Farinaz Koushanfar Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gedare Bloom, Bhagirath Narahari, Rahul Simha OS Support for Detecting Trojan Circuit Attacks. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yier Jin, Nathan Kupp, Yiorgos Makris Experiences in Hardware Trojan Design and Implementation. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Tehranipoor, Jim Plusquellic (eds.) IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings Search on Bibsonomy HOST The full citation details ... 2009 DBLP  BibTeX  RDF
1Zhimin Chen 0002, Patrick Schaumont Extended Abstract: Early Feedback on Side-Channel Risks with Accelerated Toggle-Counting. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gang Qu 0001 Temperature-Aware Cooperative Ring Oscillator PUF. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rajat Subhra Chakraborty, Swarup Bhunia Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David R. McIntyre, Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia Dynamic Evaluation of Hardware Trust. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Alexandre Berzati, Cécile Canovas, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier, Stephanie Salgado Fault Analysis of Grain-128. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar, Christof Paar Secure IP-Block Distribution for Hardware Devices. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mainak Banga, Michael S. Hsiao VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dean Collins TRUST in Integrated Circuits and 3rd Party IP. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Malcolm Taylor, Chi-En Daniel Yin, Min Wu, Gang Qu 0001 A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov Circuit CAD Tools as a Security Threat. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kevin Schutz The Role of Platform Integrity in Trustworthy Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ted Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine Trustworthy System Security through 3-D Integrated Hardware. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Francis G. Wolff, Christos A. Papachristou An Embedded Flash Memory Vault for Software Trojan Protection. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhimin Chen 0002, Patrick Schaumont Slicing Up a Perfect Hardware Masking Scheme. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Ingrid Verbauwhede Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2m). Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Reza M. Rad, Jim Plusquellic, Mohammad Tehranipoor Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sandeep S. Kumar, Jorge Guajardo, Roel Maes, Geert Jan Schrijen, Pim Tuyls The Butterfly PUF: Protecting IP on every FPGA. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia On-Demand Transparency for Improving Hardware Trojan Detectability. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yousra Alkabani, Farinaz Koushanfar Designer's Hardware Trojan Horse. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 510 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license