Author:
Farahmandi Farimah,Mishra Prabhat
Publisher
Springer International Publishing
Reference33 articles.
1. M. Banga, M. Hsiao, Trusted RTL: trojan detection methodology in pre-silicon designs, in Proceedings of 2010 IEEE Internationl Symposium on Hardware-Oriented Security and Trust (HOST) (2010), pp. 56–59
2. A. Biere, A. Cimatti, E. Clarke, Y. Zhu, Symbolic model checking without bdds, in International Conference on Tools and Algorithms for the Construction and Analysis of Systems (Springer, Berlin, 1999), pp. 193–207
3. E. Biham, Y. Carmeli, A. Shamir, Bug attacks, in CRYPTO 2008, ed. by Wagner, D. LNCS, vol. 5157 (Springer, Heidelberg, 2008), pp. 221–240
4. B. Buchberger, Some properties of gröbner-bases for polynomial ideals. ACM SIGSAM Bull. 10 (4), 19–24 (1976)
5. B. Buchberger, A criterion for detecting unnecessary reductions in the construction of a groebner bases, in EUROSAM (1979)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Package-Level Counterfeit Detection and Avoidance;Hardware Security Primitives;2022-10-12
2. Counterfeit and Recycled IC Detection;Hardware Security Primitives;2022-10-12