Abstract | ||
---|---|---|
Editor’s note: This article presents how programmable resources of an FPGA can be utilized to perform side-channel attacks and reports practical examples of these attacks. —Rosario Cammarota, Intel Labs —Francesco Regazzoni, University of Amsterdam and Università della Svizzera Italiana |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/MDAT.2021.3063306 | IEEE Design & Test |
Keywords | DocType | Volume |
Field programmable gate arrays,Delays,Latches,Trojan horses,Clocks,Hardware,Cryptography | Conference | 38 |
Issue | ISSN | Citations |
3 | 2168-2356 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Falk Schellenberg | 1 | 27 | 6.05 |
Dennis Gnad | 2 | 56 | 6.73 |
Amir Moradi | 3 | 960 | 80.66 |
Mehdi B. Tahoori | 4 | 1537 | 163.44 |