Efficient Algorithms For Sign Detection In Rns Using Approximate Reciprocals | 1 | 0.35 | 2021 |
Comparison of Pearson correlation coefficient and distance correlation in Correlation Power Analysis on Digital Multiplier | 0 | 0.34 | 2020 |
Laser-Induced Controllable Instruction Replacement Fault Attack. | 0 | 0.34 | 2020 |
Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure. | 0 | 0.34 | 2019 |
A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs. | 0 | 0.34 | 2018 |
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version). | 0 | 0.34 | 2016 |
How To Design Hardware Prime Field Multipliers For Bilinear Pairing | 0 | 0.34 | 2016 |
A DPA/DEMA/LEMA-resistant AES cryptographic processor with supply-current equalizer and micro EM probe sensor | 0 | 0.34 | 2015 |
A novel methodology for testing hardware security and trust exploiting On-Chip Power noise Measurement | 1 | 0.36 | 2015 |
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation | 6 | 0.46 | 2015 |
Power Noise Measurements Of Cryptographic Vlsi Circuits Regarding Side-Channel Information Leakage | 1 | 0.36 | 2014 |
Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology | 1 | 0.35 | 2014 |
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor | 10 | 0.70 | 2014 |
A Fast Power Current Simulation Of Cryptographic Vlsi Circuits For Side Channel Attack Evaluation | 0 | 0.34 | 2013 |
A fast power current analysis methodology using capacitor charging model for side channel attack evaluation. | 4 | 0.50 | 2011 |
An Arbitrary Digital Power Noise Generator Using 65 Nm Cmos Technology | 0 | 0.34 | 2010 |
A 6-Bit Arbitrary Digital Noise Emulator In 65nm Cmos Technology | 1 | 0.38 | 2009 |