Author:
Carlet Claude,Guilley Sylvain
Publisher
American Institute of Mathematical Sciences (AIMS)
Subject
Applied Mathematics,Discrete Mathematics and Combinatorics,Computer Networks and Communications,Algebra and Number Theory
Reference27 articles.
1. Matrices: Methods and Applications,;S. Barnett;Clarendon Press,1990
2. Binary optimal odd formally self-dual codes,;K. Betsumiya;Des. Codes Crypt.,2001
3. A low-entropy first-degree secure provable masking scheme for resource-constrained devices,;S. Bhasin;in Workshop Embedded Syst. Sec.,2013
4. Linear complementary dual code improvement to strengthen encoded circuit against hardware trojan horses,;S. Bhasin;in 2015 IEEE Int. Symp. Hardware-Oriented Sec. Trust,2015
5. Hardware trojan horses in cryptographic IP cores,;S. Bhasin;in FDTC,2013
Cited by
164 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献