Author:
Rangarajan Nikhil,Patnaik Satwik,Knechtel Johann,Rakheja Shaloo,Sinanoglu Ozgur
Publisher
Springer International Publishing
Reference88 articles.
1. N.E.C. Akkaya, B. Erbagci, K. Ma, A secure camouflaged logic family using PostManufacturing programming with a 3.6GHz adder prototype in 65nm CMOS at 1V Nominal VDD, in Proc. Int. Sol.-St. Circ. Conf. (2018)
2. I. Akgun et al., Scalable memory fabric for silicon interposer-based multi-core systems, in Proc. Int. Conf. Comp. Des. (2016), pp. 33–40. https://doi.org/10.1109/ICCD.2016.7753258
3. A. Basak et al., Security assurance for system-on-chip designs with untrusted IPs. Trans. Inf. Forens. Sec. 12(7), 1515–1528 (2017). ISSN: 1556-6013. https://doi.org/10.1109/TIFS.2017.2658544
4. E. Brier, C. Clavier, F. Olivier, Correlation power analysis with a leakage model, in Proc. Cryptogr. Hardw. Embed. Sys. (2004)
5. S. Briais et al., 3D Hardware Canaries, in Proc. Cryptogr. Hardw. Embed. Sys. , ed. by E. Prouff, P. Schaumont (Springer, Berlin, Heidelberg, 2012), pp. 1–22. ISBN: 978-3-642-33027-8. https://doi.org/10.1007/978-3-642-33027-8_1