Key Retrieval from AES Architecture Through Hardware Trojan Horse
2015 ◽
Vol 7
(2)
◽
pp. 46-50
◽
2011 ◽
Vol 27
(5)
◽
pp. 555-563
◽
2016 ◽
Vol 6
(3)
◽
pp. 239-247
◽
Keyword(s):
2017 ◽
Vol 5
(2)
◽
pp. 260-270
◽