Author:
Werner Vincent,Maingault Laurent,Potet Marie-Laure
Publisher
Springer International Publishing
Reference36 articles.
1. Lecture Notes in Computer Science;S Anceau,2017
2. Lecture Notes in Computer Science;C Aumüller,2003
3. Aziz, M.: On Multi-Armed Bandits Theory and Applications. PhD thesis, Ph. D. Thesis, Northeastern University, Boston, MA, USA (2019)
4. Balasch, J., Gierlichs, B., Verbauwhede, I.: An in-depth and black-box characterization of the effects of clock glitches on 8-bit mcus. In: 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 105–114. IEEE (2011)
5. Bellman, R.E.: Adaptive Control Processes. Princeton University Press, Princeton (1861)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CGAN-based Automated Fault Injection;2024 IEEE European Test Symposium (ETS);2024-05-20
2. Diversity Algorithms for Laser Fault Injection;Lecture Notes in Computer Science;2024
3. Analysis of Arbitrary Waveform Generation for Voltage Glitches;2023 Workshop on Fault Detection and Tolerance in Cryptography (FDTC);2023-09-10
4. What Do You See? Transforming Fault Injection Target Characterizations;Security, Privacy, and Applied Cryptography Engineering;2022