1. [1] H. Li, et al.: “A survey of hardware Trojan detection, diagnosis and prevention,” IEEE International Conference on Computer-Aided Design and Computer Graphics (2015) (DOI: 10.1109/CADGRAPHICS.2015.41).
2. [2] J. Breier and W. He: “Multiple fault attack on PRESENT with a hardware Trojan implementation in FPGA,” IEEE International Workshop on Secure Internet of Things (2015) (DOI: 10.1109/SIOT.2015.15).
3. [3] H. Marzouqi, et al.: “Attack countermeasure for ECC processor using One-Hot RSD encoding,” 2014 21st IEEE International Conference on Electronics, Circuits and Systems (2014) (DOI: 10.1109/ICECS.2014.7049983).
4. [4] S. Patranabis, et al.: “One plus one is more than two: A practical combination of power and fault analysis attacks on PRESENT and PRESENT-like block ciphers,” 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (2017) (DOI: 10.1109/FDTC.2017.11).
5. [5] R. S. Chakraborty, et al.: “MERO: A statistical approach for hardware Trojan detection,” (2009).