A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement (Englisch)
- Neue Suche nach: Bhargava, Mudit
- Neue Suche nach: Mai, Ken
- Neue Suche nach: Bhargava, Mudit
- Neue Suche nach: Mai, Ken
In:
CHES, International Workshop on Cryptographic Hardware and Embedded Systems, 15
;
90-106
;
2013
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
-
Beteiligte:Bhargava, Mudit ( Autor:in ) / Mai, Ken ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 8086 ; 90-106
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2013
-
Format / Umfang:17 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
On the Simplicity of Converting Leakages from Multivariate to Univariate: Case Study of a Glitch-Resistant Masking SchemeMoradi, A. / Mischke, O. et al. | 2013
- 21
-
Success through Confidence: Evaluating the Effectiveness of a Side-Channel AttackThillard, A. / Prouff, E. / Roche, T. et al. | 2013
- 37
-
Profiling DPA: Efficacy and Efficiency Trade-OffsWhitnall, C. / Oswald, E. et al. | 2013
- 55
-
Non-invasive Spoofing Attacks for Anti-lock Braking SystemsShoukry, Y. / Martin, P. / Tabuada, P. / Srivastava, M. et al. | 2013
- 73
-
An Accurate Probabilistic Reliability Model for Silicon PUFsMaes, R. et al. | 2013
- 90
-
A High Reliability PUF Using Hot Carrier Injection Based Response ReinforcementBhargava, M. / Mai, K. et al. | 2013
- 107
-
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFsOren, Y. / Sadeghi, A.-R. / Wachsmann, C. et al. | 2013
- 126
-
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFIDPessl, P. / Hutter, M. et al. | 2013
- 142
-
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained HardwareBilgin, B. / Bogdanov, A. / Knezevic, M. / Mendel, F. / Wang, Q. et al. | 2013
- 159
-
On Measurable Side-Channel Leaks Inside ASIC Design PrimitivesSugawara, T. / Suzuki, D. / Saeki, M. / Shiozaki, M. / Fujino, T. et al. | 2013
- 179
-
A Very High Speed True Random Number Generator with Entropy AssessmentCherkaoui, A. / Fischer, V. / Fesquet, L. / Aubert, A. et al. | 2013
- 197
-
Stealthy Dopant-Level Hardware TrojansBecker, G.T. / Regazzoni, F. / Paar, C. / Burleson, W.P. et al. | 2013
- 215
-
A Differential Fault Attack on MICKEY 2.0Banik, S. / Maitra, S. et al. | 2013
- 233
-
Improving Modular Inversion in RNS Using the Plus-Minus MethodBigou, K. / Tisserand, A. et al. | 2013
- 250
-
McBits: Fast Constant-Time Code-Based CryptographyBernstein, D.J. / Chou, T. / Schwabe, P. et al. | 2013
- 273
-
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded DevicesHeyse, S. / von Maurich, I. / Guneysu, T. et al. | 2013
- 293
-
Sleuth: Automated Verification of Software Power Analysis CountermeasuresBayrak, A.G. / Regazzoni, F. / Novo, D. / Ienne, P. et al. | 2013
- 311
-
Lambda Coordinates for Binary Elliptic CurvesOliveira, T. / Lopez, J. / Aranha, D.F. / Rodriguez-Henriquez, F. et al. | 2013
- 331
-
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS DecompositionBos, J.W. / Costello, C. / Hisil, H. / Lauter, K. et al. | 2013
- 349
-
On the Implementation of Unified Arithmetic on Binary Huff CurvesGhosh, S. / Kumar, A. / Das, A. / Verbauwhede, I. et al. | 2013
- 365
-
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using FaultsLashermes, R. / Fournier, J. / Goubin, L. et al. | 2013
- 383
-
Block Ciphers That Are Easier to Mask: How Far Can We Go?Gerard, B. / Grosso, V. / Naya-Plasencia, M. / Standaert, F.-X. et al. | 2013
- 400
-
Masking vs. Multiparty Computation: How Large Is the Gap for AES?Grosso, V. / Standaert, F.-X. / Faust, S. et al. | 2013
- 417
-
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012Roy, A. / Vivek, S. et al. | 2013
- 435
-
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSADe Mulder, E. / Hutter, M. / Marson, M.E. / Pearson, P. et al. | 2013
- 453
-
A New Model for Error-Tolerant Side-Channel Cube AttacksLi, Z. / Zhang, B. / Fan, J. / Verbauwhede, I. et al. | 2013
- 471
-
Leakage-Resilient Symmetric Encryption via Re-keyingAbdalla, M. / Belaid, S. / Fouque, P.-A. et al. | 2013