Author:
Cozzi Maxime,Galliere Jean-Marc,Maurine Philippe
Publisher
Springer International Publishing
Reference20 articles.
1. Loai, A., Houssain, H., Al-Somani, T.F.: Review of Side Channel Attacks and Countermeasures on ECC, RSA, and AES Cryptosystems
2. Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 33(12), 1792–1805 (2014)
3. Ngo, X.T., Najm, Z., Bhasin, S., Guilley, S., Danger, J.L.: Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptogr. Eng. 6, 239–247 (2016)
4. Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection. In: IEEE International Symposium on Electromagnetic Compatibility (EMC), Dresden, pp. 246–251 (2015)
5. Zhang, X., Tehranipoor, M.: RON: an on-chip ring oscillator network for hardware Trojan detection. In: Design, Automation and Test in Europe, Grenoble, pp. 1–6 (2011)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献