Author:
Ravi Prasanna,Deb Suman,Baksi Anubhab,Chattopadhyay Anupam,Bhasin Shivam,Mendelson Avi
Publisher
Springer International Publishing
Reference26 articles.
1. Alagic, G., et al.: Status report on the second round of the NIST PQC standardization process. Technical report, July, NIST (2020)
2. Lecture Notes in Computer Science;D Amiet,2020
3. Avanzi, R., et al.: CRYSTALS-Kyber (version 2.0) - Algorithm Specifications And Supporting Documentation, 1 April 2019. Submission to the NIST post-quantum project
4. Bhasin, S., Danger, J.L., Guilley, S., Ngo, X.T., Sauvage, L.: Hardware trojan horses in cryptographic IP cores. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 15–29. IEEE (2013)
5. Cakır, B., Malik, S.: Hardware trojan detection for gate-level ICS using signal correlation based clustering. In: 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 471–476. IEEE (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献