Author:
Baranowski Rafal,Kochte Michael A.,Wunderlich Hans-Joachim
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and Implementation of a Fully Pipelined and Parameterizable Hardware Accelerator for BLAKE2 Cryptographic Hash Function in FPGA;2023 3rd Asian Conference on Innovation in Technology (ASIANCON);2023-08-25
2. On Protecting IJTAG from Data Sniffing and Alteration Attacks;2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI);2022-07
3. Boundary Scan Security Models using Cryptographic Primitives;2022 6th International Conference on Trends in Electronics and Informatics (ICOEI);2022-04-28
4. Security Against Data-Sniffing and Alteration Attacks in IJTAG;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2021-07
5. Multi-Level Access Protection for Future IEEE P1687.1 IJTAG Networks;2020 IEEE International Test Conference (ITC);2020-11-01