Fit The Joint Moments. | 0 | 0.34 | 2022 |
Modeling and Simulating Electromagnetic Fault Injection | 1 | 0.37 | 2021 |
Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation Stage | 0 | 0.34 | 2021 |
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs. | 0 | 0.34 | 2021 |
Simulation and Experimental Demonstration of the Importance of IR-Drops During Laser Fault Injection. | 3 | 0.50 | 2020 |
Leakage Assessment Through Neural Estimation of the Mutual Information. | 0 | 0.34 | 2020 |
Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis | 0 | 0.34 | 2019 |
Editorial | 0 | 0.34 | 2019 |
Electromagnetic Fault Injection : How Faults Occur | 1 | 0.36 | 2019 |
From theory to practice: horizontal attacks on protected implementations of modular exponentiations | 0 | 0.34 | 2019 |
From theory to practice: horizontal attacks on protected implementations of modular exponentiations | 0 | 0.34 | 2019 |
Electromagnetic Activity vs. Logical Activity - Near Field Scans for Reverse Engineering. | 0 | 0.34 | 2018 |
Standard CAD Tool-Based Method for Simulation of Laser-Induced Faults in Large-Scale Circuits. | 1 | 0.36 | 2018 |
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection | 0 | 0.34 | 2018 |
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators | 1 | 0.35 | 2018 |
Estimating the Signal-to-Noise Ratio Under Repeated Sampling of the Same Centered Signal: Applications to Side-Channel Attacks on a Cryptoprocessor. | 0 | 0.34 | 2018 |
An EM Fault Injection Susceptibility Criterion and Its Application to the Localization of Hotspots. | 0 | 0.34 | 2017 |
Role of Laser-Induced IR Drops in the Occurrence of Faults: Assessment and Simulation | 0 | 0.34 | 2017 |
Importance of IR drops on the modeling of laser-induced transient faults | 0 | 0.34 | 2017 |
Method for evaluation of transient-fault detection techniques. | 1 | 0.36 | 2017 |
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification. | 4 | 0.40 | 2017 |
Mutual information analysis: higher-order statistical moments, efficiency and efficacy. | 0 | 0.34 | 2017 |
Electromagnetic fault injection: the curse of flip-flops. | 4 | 0.44 | 2017 |
A fully-digital EM pulse detector | 0 | 0.34 | 2016 |
An Embedded Digital Sensor against EM and BB Fault Injection | 2 | 0.46 | 2016 |
On-chip fingerprinting of IC topology for integrity verification. | 0 | 0.34 | 2016 |
Interest of MIA in frequency domain? | 0 | 0.34 | 2015 |
Collision for Estimating SCA Measurement Quality and Related Applications. | 2 | 0.37 | 2015 |
Extraction of intrinsic structure for Hardware Trojan detection. | 0 | 0.34 | 2015 |
Collision Based Attacks in Practice | 3 | 0.41 | 2015 |
Vertical and horizontal correlation attacks on RNS-based exponentiations | 1 | 0.35 | 2015 |
EM Injection: Fault Model and Locality. | 8 | 0.63 | 2015 |
Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection | 0 | 0.34 | 2015 |
Attacking Randomized Exponentiations Using Unsupervised Learning | 5 | 0.49 | 2014 |
Analysis Of Variance and CPA in SCA. | 1 | 0.35 | 2014 |
Evidence of a Larger EM-Induced Fault Model. | 10 | 0.65 | 2014 |
A model of the leakage in the frequency domain and its application to CPA and DPA. | 7 | 0.46 | 2014 |
On Adaptive Bandwidth Selection For Efficient Mia | 3 | 0.39 | 2014 |
Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks. | 2 | 0.37 | 2013 |
A Frequency Leakage Model and its application to CPA and DPA. | 0 | 0.34 | 2013 |
Electromagnetic Analysis on RSA Algorithm Based on RNS | 5 | 0.44 | 2013 |
An evaluation of an AES implementation protected against EM analysis | 2 | 0.37 | 2013 |
Countermeasures Against Em Analysis For A Secured Fpga-Based Aes Implementation | 3 | 0.43 | 2013 |
Amplitude demodulation-based EM analysis of different RSA implementations | 3 | 0.40 | 2012 |
Delay-correlation-aware SSTA based on conditional moments | 1 | 0.48 | 2012 |
Magnitude Squared Coherence based SCA. | 1 | 0.36 | 2012 |
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-. | 11 | 0.95 | 2012 |
Embedding statistical tests for on-chip dynamic voltage and temperature monitoring | 12 | 0.71 | 2012 |
SCA with magnitude squared coherence | 2 | 0.38 | 2012 |
Statistical timing characterization | 0 | 0.34 | 2012 |