ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Hardware Security and Trust
Latest Publications
TOTAL DOCUMENTS
12
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By Springer International Publishing
9783319443164, 9783319443188
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Practical Session: Differential Power Analysis for Beginners
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_4
◽
2017
◽
pp. 77-91
Author(s):
Jiří Buček
◽
Martin Novotný
◽
Filip Štěpánek
Keyword(s):
Power Analysis
◽
Differential Power Analysis
◽
Practical Session
Download Full-text
Malware Threats and Solutions for Trustworthy Mobile Systems Design
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_8
◽
2017
◽
pp. 149-167
◽
Cited By ~ 3
Author(s):
Jelena Milosevic
◽
Francesco Regazzoni
◽
Miroslaw Malek
Keyword(s):
Systems Design
◽
Mobile Systems
Download Full-text
AES Datapaths on FPGAs: A State of the Art Analysis
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_1
◽
2017
◽
pp. 1-25
◽
Cited By ~ 1
Author(s):
João Carlos Resende
◽
Ricardo Chaves
Keyword(s):
State Of The Art
◽
Art Analysis
Download Full-text
Implementation and Analysis of Ring Oscillator Circuits on Xilinx FPGAs
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_12
◽
2017
◽
pp. 237-251
◽
Cited By ~ 2
Author(s):
Mario Barbareschi
◽
Giorgio Di Natale
◽
Lionel Torres
Keyword(s):
Ring Oscillator
◽
Oscillator Circuits
Download Full-text
Manufacturing Testing and Security Countermeasures
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_7
◽
2017
◽
pp. 127-148
◽
Cited By ~ 2
Author(s):
Giorgio Di Natale
◽
Marie-Lise Flottes
◽
Bruno Rouzeyre
◽
Paul-Henri Pugliesi-Conti
Keyword(s):
Manufacturing Testing
◽
Security Countermeasures
Download Full-text
Implementation of Delay-Based PUFs on Altera FPGAs
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_11
◽
2017
◽
pp. 211-235
◽
Cited By ~ 1
Author(s):
Linus Feiten
◽
Matthias Sauer
◽
Bernd Becker
Download Full-text
Recent Developments in Side-Channel Analysis on Elliptic Curve Cryptography Implementations
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_3
◽
2017
◽
pp. 49-76
◽
Cited By ~ 3
Author(s):
Louiza Papachristodoulou
◽
Lejla Batina
◽
Nele Mentens
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Side Channel
◽
Side Channel Analysis
◽
Recent Developments
◽
Channel Analysis
Download Full-text
Ring Oscillators and Hardware Trojan Detection
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_9
◽
2017
◽
pp. 169-187
◽
Cited By ~ 4
Author(s):
Paris Kitsos
◽
Nicolas Sklavos
◽
Artemios G. Voyiatzis
Keyword(s):
Hardware Trojan
◽
Ring Oscillators
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Fault Attacks, Injection Techniques and Tools for Simulation
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_2
◽
2017
◽
pp. 27-47
◽
Cited By ~ 8
Author(s):
Roberta Piscitelli
◽
Shivam Bhasin
◽
Francesco Regazzoni
Keyword(s):
Fault Attacks
◽
Injection Techniques
Download Full-text
Notions on Silicon Physically Unclonable Functions
Hardware Security and Trust
◽
10.1007/978-3-319-44318-8_10
◽
2017
◽
pp. 189-209
◽
Cited By ~ 1
Author(s):
Mario Barbareschi
Keyword(s):
Physically Unclonable Functions
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close