


default search action
AsianHOST 2021: Shanghai, China
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2021, Shanghai, China, December 16-18, 2021. IEEE 2021, ISBN 978-1-6654-4185-8

- Xiangjun Lu, Chi Zhang, Dawu Gu:

Attention - Based Non-Profiled Side-Channel Attack. 1-6 - Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino:

Deep Learning Side-Channel Attacks Against Lightweight SCA Countermeasure RSM-AES. 1-6 - Jinxin Dong, Pingqiang Zhou:

Detecting Adversarial Examples Utilizing Pixel Value Diversity. 1-6 - Markku-Juhani O. Saarinen

:
On Entropy and Bit Patterns of Ring Oscillator Jitter. 1-6 - Timothy Dunlap, Omid Aramoon, Gang Qu, Tian Wang, Xiaoxin Cui, Dunshan Yu:

A Novel Circuit Authentication Scheme Based on Partial Polymorphic Gates. 1-4 - Sandhya Koteshwara:

Security Risk Assessment of Server Hardware Architectures Using Graph Analysis. 1-4 - Chi Zhang, Xiangjun Lu, Dawu Gu:

Binary Classification-Based Side-Channel Analysis. 1-6 - Yuqian Sun, Xiaole Cui, Yongliang Chen, Xiaoxin Cui:

The logic obfuscation of LFSR with the crosstalk based polymorphic gate. 1-6 - Weihang Tan, Antian Wang

, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi
:
Pipelined High-Throughput NTT Architecture for Lattice-Based Cryptography. 1-4 - Qiang Fang, Massimo Alioto:

Last-Round and Joint First/Last-Round Power Analysis Attacks on PRESENT. 1-6 - Kshitij Raj

, Arrush Hegde, Atul Prasad Deb Nath, Swarup Bhunia
, Sandip Ray:
SSEL: An Extensible Specification Language for SoC Security. 1-6 - Jizhong Yang, Ying Zhang, Yifeng Hua, Jiaqi Yao, Zhiming Mao, Xin Chen:

Hardware Trojans Detection Through RTL Features Extraction and Machine Learning. 1-4 - Xuyang Huang, Ming Ming Wong, Anh Tuan Do, Wang Ling Goh:

A Backpropagation Extreme Learning Machine Approach to Fast Training Neural Network-Based Side-Channel Attack. 1-6 - Hirak Mondal, Urbi Chatterjee:

Revisiting UAV Authentication Schemes: Practical Attacks on Aviation Infrastructure. 1-6 - Jonathon Durand, Anisul Abedin, Jakub Szefer:

Ultra Freezing Attacks and Clock Glitching of Clock Oscillator Circuits. 1-6 - Chandan Kumar Chaudhary

, Urbi Chatterjee, Debdeep Mukhopadhyay:
Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain. 1-4 - Rei Kudo, Takeshi Sugawara

, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li:
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm. 1-6 - Zain Ul Abideen

, Tiago Diadami Perez, Samuel Pagliarini:
From FPGAs to Obfuscated eASICs: Design and Security Trade-offs. 1-4 - Lijuan Han, Yuan Cao, Lei Qian, Haodong Xie, Chip-Hong Chang:

An Ultra-Low Power 3-T Chaotic Map based True Random Number Generator. 1-6 - Xingxin Wang, Jian Zheng, Lingjuan Wu, Jiacheng Zhu, Wei Hu:

A Correlation Fault Attack on Rotating S-Box Masking AES. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














