Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Software
Reference31 articles.
1. Exploiting vulnerabilities in cryptographic hash functions based on reconfigurable hardware;Cilardo;IEEE Trans. Inf. Forensics Secur.,2013
2. Secure distribution infrastructure for hardware digital contents;Cilardo;IET Comput. Digital Tech.,2014
3. New techniques and tools for application-dependent testing of fpga-based components;Cilardo;IEEE Trans. Industrial Inform.,2015
4. Breakthrough silicon scanning discovers backdoor in military chip;Skorobogatov,2012
5. Silicon physical random functions;Gassend,2002
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献