Author:
Wouters Lennert,Gierlichs Benedikt,Preneel Bart
Publisher
Springer International Publishing
Reference59 articles.
1. Lecture Notes in Computer Science;M Agoyan,2010
2. Anderson, R., Kuhn, M.: Tamper resistance-a cautionary note. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, vol. 2, pp. 1–11 (1996)
3. Lecture Notes in Computer Science;R Anderson,1998
4. Lecture Notes in Computer Science;J Balasch,2012
5. Bozzato, C., Focardi, R., Palmarini, F.: Shaping the glitch: optimizing voltage fault injection attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst.2019(2), 199–224 (2019). https://doi.org/10.13154/tches.v2019.i2.199-224
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices;Proceedings of the First International Workshop on Security and Privacy of Sensing Systems;2023-11-12