1. Ahmed, B., Bepary, M.K., Pundir, N., Borza, M., Raikhman, O., Garg, A., Donchin, D., Cron, A., Abdel-moneum, M.A., Farahmandi, F., et al.: Quantifiable assurance: from IPs to platforms (2022). arXiv preprint arXiv:2204.07909
2. Anandakumar, N.N., Dillibabu, S.: Correlation power analysis attack of AES on FPGA using customized communication protocol. In: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT ’12, pp. 683–688 (2012)
3. Anandakumar, N.N., Das, M.P.L., Sanadhya, S.K., Hashmi, M.S.: Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve. ACM Trans. Reconfigurable Technol. Syst. 11(2), 1–19 (2018)
4. Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 260–275. Springer, Berlin (2002)
5. Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., Sporleder, C., et al.: Acoustic {side-channel} attacks on printers. In: 19th USENIX Security Symposium (USENIX Security 10) (2010)