Stop the war!
Остановите войну!
for scientists:
default search action
AsianHOST 2016: Yilan, Taiwan
- 2016 IEEE Asian Hardware-Oriented Security and Trust, AsianHOST 2016, Yilan, Taiwan, December 19-20, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5701-6
- Travis E. Schulze, Kevin A. Kwiat, Charles A. Kamhoua, Shih-Chieh Chang, Yiyu Shi:
RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan. 1-6 - Poulami Das, Debapriya Basu Roy, Harishma Boyapally, Debdeep Mukhopadhyay:
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves. 1-6 - Mehran Mozaffari Kermani, Reza Azarderakhsh, Jiafeng Xie:
Error detection reliable architectures of Camellia block cipher applicable to different variants of its substitution boxes. 1-6 - Md. Tauhidur Rahman, Domenic Forte, Xiaoxiao Wang, Mark M. Tehranipoor:
Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs. 1-6 - Jiadong Wang, Aijiao Cui, Mengyang Li, Gang Qu, Huawei Li:
An ultra-low overhead LUT-based PUF for FPGA. 1-6 - Aesun Park, Dong-Guk Han:
Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption. 1-6 - Kohei Matsuda, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Tatsuya Fujii, Kazuo Sakiyama:
On-chip substrate-bounce monitoring for laser-fault countermeasure. 1-6 - Sying-Jyan Wang, Jhih-Yu Wei, Shih-Heng Huang, Katherine Shu-Min Li:
Test generation for combinational hardware Trojans. 1-6 - Jaya Dofe, Chen Yan, Scott Kontak, Emre Salman, Qiaoyan Yu:
Transistor-level camouflaged logic locking method for monolithic 3D IC security. 1-6 - Yue Zheng, Yuan Cao, Chip-Hong Chang:
A new event-driven Dynamic Vision Sensor based Physical Unclonable Function for camera authentication in reactive monitoring system. 1-6 - Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. 1-6 - Senwen Kan, Jennifer Dworak, James George Dunham:
Echeloned IJTAG data protection. 1-6 - Zhang Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin:
How secure is split manufacturing in preventing hardware trojan? 1-6 - Joshua Mead, Christophe Bobda, Taylor J. L. Whitaker:
Defeating drone jamming with hardware sandboxing. 1-6 - Liran Lerman, Olivier Markowitch, Nikita Veshchikov:
Comparing Sboxes of ciphers from the perspective of side-channel attacks. 1-6 - Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Aging attacks for key extraction on permutation-based obfuscation. 1-6 - Yuan Cao, Le Zhang, Chip-Hong Chang:
Using image sensor PUF as root of trust for birthmarking of perceptual image hash. 1-6 - Sami Saab, Andrew Leiserson, Michael Tunstall:
Key extraction from the primary side of a switched-mode power supply. 1-7 - Jing Ye, Yu Hu, Xiaowei Li:
RPUF: Physical Unclonable Function with Randomized Challenge to resist modeling attack. 1-6 - Pushpita Roy, Ansuman Banerjee:
A new approach for root-causing attacks on digital microfluidic devices. 1-6 - Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede:
Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs. 1-6 - Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto:
Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits. 1-6 - Mingfu Xue, Jian Wang, Aiqun Hu:
An enhanced classification-based golden chips-free hardware Trojan detection technique. 1-6 - Md. Badruddoja Majumder, Mesbah Uddin, Garrett S. Rose, Jeyavijayan Rajendran:
Sneak path enabled authentication for memristive crossbar memories. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.