Funder
National Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Building and Construction
Reference45 articles.
1. [n. d.]. ([n. d.]).
http://www.columbia.edu/cu/computinghistory/ascc.html
2. [n. d.]. ARM Security Technology – Building a Secure System using TrustZone Technology (2009)
http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf
. ([n. d.])
3. Bar-El H, Choukri H, Naccache D, Tunstall M, Whelan C (2006) The sorcerer’s apprentice guide to fault attacks. Proc IEEE 94 2:370–382.
https://doi.org/10.1109/JPROC.2005.862424
4. Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd annual design automation conference (DAC ’15). ACM, New York, Article 175, p 6.
https://doi.org/10.1145/2744769.2747946
5. Bhattacharya S, Mukhopadhyay D (2016) Curious case of rowhammer: flipping secret exponent bits using timing analysis. Springer Berlin Heidelberg, Berlin, pp 602–624.
https://doi.org/10.1007/978-3-662-53140-2_29