Author:
Halak Basel,Hall Christian,Fathir Syed Abdul,Kit Nelson Chow Wai,Raymode Ruwaydah Widaad
Publisher
Springer International Publishing
Reference42 articles.
1. https://epsrc.ukri.org/research/ourportfolio/themes/digitaleconomy/. (2018).
2. J. E. Duarte-Sanchez and B. Halak, “A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon,” in Hardware Supply Chain Security, ed: Springer, 2021, pp. 69–88.
3. B. N. a. E. Peeters, “System-level tamper protection using msp mcus,” Texas Instruments 2016.
4. Y. Jin, D. Maliuk, and Y. Makris, “Post-deployment trust evaluation in wireless cryptographic ICs,” in 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012, pp. 965–970.
5. K. Huang, J. M. Carulli, and Y. Makris, “Parametric counterfeit IC detection via support vector machines,” in 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2012, pp. 7–12.