Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection (Englisch)
Freier Zugriff
- Neue Suche nach: Du, Dongdong
- Neue Suche nach: Narasimhan, Seetharam
- Neue Suche nach: Chakraborty, Rajat Subhra
- Neue Suche nach: Bhunia, Swarup
- Neue Suche nach: Du, Dongdong
- Neue Suche nach: Narasimhan, Seetharam
- Neue Suche nach: Chakraborty, Rajat Subhra
- Neue Suche nach: Bhunia, Swarup
In:
Cryptographic Hardware and Embedded Systems, CHES 2010
4
;
173-187
;
2010
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection
-
Beteiligte:Du, Dongdong ( Autor:in ) / Narasimhan, Seetharam ( Autor:in ) / Chakraborty, Rajat Subhra ( Autor:in ) / Bhunia, Swarup ( Autor:in )
-
Erschienen in:Cryptographic Hardware and Embedded Systems, CHES 2010 , 4 ; 173-187Lecture Notes in Computer Science ; 6225, 4 ; 173-187
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Quark: A Lightweight HashAumasson, Jean-Philippe / Henzen, Luca / Meier, Willi / Naya-Plasencia, María et al. | 2010
- 16
-
PRINTcipher: A Block Cipher for IC-PrintingKnudsen, Lars / Leander, Gregor / Poschmann, Axel / Robshaw, Matthew J. B. et al. | 2010
- 33
-
Sponge-Based Pseudo-Random Number GeneratorsBertoni, Guido / Daemen, Joan / Peeters, Michaël / Assche, Gilles et al. | 2010
- 48
-
A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over $\mathbb{F}_p$Guillermin, Nicolas et al. | 2010
- 65
-
Co-Z Addition Formulæ and Binary Ladders on Elliptic CurvesGoundar, Raveen R. / Joye, Marc / Miyaji, Atsuko et al. | 2010
- 80
-
Efficient Techniques for High-Speed Elliptic Curve CryptographyLonga, Patrick / Gebotys, Catherine et al. | 2010
- 95
-
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009Coron, Jean-Sébastien / Kizhvatov, Ilya et al. | 2010
- 110
-
New Results on Instruction Cache AttacksAcıiçmez, Onur / Brumley, Billy Bob / Grabher, Philipp et al. | 2010
- 125
-
Correlation-Enhanced Power Analysis Collision AttackMoradi, Amir / Mischke, Oliver / Eisenbarth, Thomas et al. | 2010
- 140
-
Side-Channel Analysis of Six SHA-3 CandidatesBenoît, Olivier / Peyrin, Thomas et al. | 2010
- 158
-
Flash Memory ‘Bumping’ AttacksSkorobogatov, Sergei et al. | 2010
- 173
-
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan DetectionDu, Dongdong / Narasimhan, Seetharam / Chakraborty, Rajat Subhra / Bhunia, Swarup et al. | 2010
- 188
-
When Failure Analysis Meets Side-Channel AttacksDi-Battista, Jerome / Courrege, Jean-Christophe / Rouzeyre, Bruno / Torres, Lionel / Perdu, Philippe et al. | 2010
- 203
-
Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$Bouillaguet, Charles / Chen, Hsieh-Chung / Cheng, Chen-Mou / Chou, Tung / Niederhagen, Ruben / Shamir, Adi / Yang, Bo-Yin et al. | 2010
- 219
-
256 Bit Standardized Crypto for 650 GE – GOST RevisitedPoschmann, Axel / Ling, San / Wang, Huaxiong et al. | 2010
- 234
-
Mixed Bases for Efficient Inversion in ${{\mathbb F}{((2^2)^2)}{2}}$ and Conversion Matrices of SubBytes of AESNogami, Yasuyuki / Nekado, Kenta / Toyota, Tetsumi / Hongo, Naoto / Morikawa, Yoshitaka et al. | 2010
- 248
-
Developing a Hardware Evaluation Method for SHA-3 CandidatesHenzen, Luca / Gendotti, Pietro / Guillet, Patrice / Pargaetzi, Enrico / Zoller, Martin / Gürkaynak, Frank K. et al. | 2010
- 264
-
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAsGaj, Kris / Homsirikamol, Ekawat / Rogawski, Marcin et al. | 2010
- 279
-
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core ArchitecturesBos, Joppe W. / Stefan, Deian et al. | 2010
- 294
-
XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking FrameworkWenzel-Benner, Christian / Gräf, Jens et al. | 2010
- 306
-
Public Key Perturbation of Randomized RSA ImplementationsBerzati, Alexandre / Canovas-Dumas, Cécile / Goubin, Louis et al. | 2010
- 320
-
Fault Sensitivity AnalysisLi, Yang / Sakiyama, Kazuo / Gomisawa, Shigeto / Fukunaga, Toshinori / Takahashi, Junko / Ohta, Kazuo et al. | 2010
- 335
-
An Alternative to Error Correction for SRAM-Like PUFsHofer, Maximilian / Boehm, Christoph et al. | 2010
- 351
-
New High Entropy Element for FPGA Based True Random Number GeneratorsVarchola, Michal / Drutarovsky, Milos et al. | 2010
- 366
-
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch ShapesSuzuki, Daisuke / Shimizu, Koichi et al. | 2010
- 383
-
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time ProgramsJärvinen, Kimmo / Kolesnikov, Vladimir / Sadeghi, Ahmad-Reza / Schneider, Thomas et al. | 2010
- 398
-
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to HardwareBadel, Stéphane / Dağtekin, Nilay / Nakahara, Jorge Jr. / Ouafi, Khaled / Reffé, Nicolas / Sepehrdad, Pouyan / Sušil, Petr / Vaudenay, Serge et al. | 2010
- 413
-
Provably Secure Higher-Order Masking of AESRivain, Matthieu / Prouff, Emmanuel et al. | 2010
- 428
-
Algebraic Side-Channel Analysis in the Presence of ErrorsOren, Yossef / Kirschbaum, Mario / Popp, Thomas / Wool, Avishai et al. | 2010
- 443
-
Coordinate Blinding over Large Prime FieldsTunstall, Michael / Joye, Marc et al. | 2010