Stealthy Dopant-Level Hardware Trojans
- 1 January 2013
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Counterfeit chips on the riseIEEE Spectrum, 2012
- Blue team red team approach to hardware trust assessmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel EngineeringLecture Notes in Computer Science, 2009
- Mutual Information AnalysisLecture Notes in Computer Science, 2008
- Hardware Trojan detection using path delay fingerprintPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Evaluation of the Masked Logic Style MDPL on a Prototype ChipLecture Notes in Computer Science, 2007
- Report of the Defense Science Board Task Force on Nuclear Capabilities Report SummaryPublished by Defense Technical Information Center (DTIC) ,2006
- A Very Compact S-Box for AESLecture Notes in Computer Science, 2005
- Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing ConstraintsLecture Notes in Computer Science, 2005
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004