Key Retrieval from AES Architecture Through Hardware Trojan Horse

Author(s):  
Sivappriya Manivannan ◽  
N. Nalla Anandakumar ◽  
M. Nirmala Devi
Keyword(s):  
Author(s):  
Hongbo Gao ◽  
Qingbao Li ◽  
Yu Zhu ◽  
Yong Liu
Keyword(s):  

Author(s):  
Miodrag Potkonjak ◽  
Ani Nahapetian ◽  
Michael Nelson ◽  
Tammara Massey
Keyword(s):  

Author(s):  
Krishna Bagadia ◽  
Urbi Chatterjee ◽  
Debapriya Basu Roy ◽  
Debdeep Mukhopadhyay ◽  
Rajat Subhra Chakraborty

2015 ◽  
Vol 7 (2) ◽  
pp. 46-50 ◽  
Author(s):  
Behnam Khaleghi ◽  
Ali Ahari ◽  
Hossein Asadi ◽  
Siavash Bayat-Sarmadi

2011 ◽  
Vol 27 (5) ◽  
pp. 555-563 ◽  
Author(s):  
John Clark ◽  
Sylvain Leblanc ◽  
Scott Knight
Keyword(s):  

2016 ◽  
Vol 6 (3) ◽  
pp. 239-247 ◽  
Author(s):  
Xuan Thuy Ngo ◽  
Zakaria Najm ◽  
Shivam Bhasin ◽  
Sylvain Guilley ◽  
Jean-Luc Danger

2017 ◽  
Vol 5 (2) ◽  
pp. 260-270 ◽  
Author(s):  
Rajat Subhra Chakraborty ◽  
Samuel Pagliarini ◽  
Jimson Mathew ◽  
Sree Ranjani Rajendran ◽  
M. Nirmala Devi

Sign in / Sign up

Export Citation Format

Share Document