Author:
Kaur Shaminder,Singh Balwinder,Kaur Harsimranjit
Publisher
Springer Science and Business Media LLC
Reference71 articles.
1. Barnghi A, Breveglieri L, Korean I, Naccache D. Fault injection attacks on crytographic devices: theory, practise and countermeasures. IEEE Proc. 2012;100(11):3056–76.
2. Kazemi Z. Hardware security evaluation platform for MCU-based connected devices: application to healthcare IoT. In: 3rd international verification and security workshop, IVSW, IEEE workshop, 2018; pp. 87–92
3. Skorobogatov S. Hardware security implications of reliability, remanence, and recovery in embedded memory. J Hardw Syst Secur. 2018;2(4):314–21.
4. Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Proceedings of CRYPTO, 2010; pp. 513–525
5. Gu J, Qu G, Zhou Q. Information hiding for trusted system designs. In: 46th proceedings of annual design automation conference (DAC), 2009; pp. 698–701
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献