ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
Latest Publications
TOTAL DOCUMENTS
27
(FIVE YEARS 0)
H-INDEX
15
(FIVE YEARS 0)
Published By IEEE
9781479905591, 9781479906017
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Frontside laser fault injection on cryptosystems - Application to the AES' last round -
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581576
◽
2013
◽
Cited By ~ 22
Author(s):
Cyril Roscian
◽
Jean-Max Dutertre
◽
Assia Tria
Keyword(s):
Fault Injection
◽
Laser Fault Injection
Download Full-text
A bulk built-in sensor for detection of fault attacks
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581565
◽
2013
◽
Cited By ~ 8
Author(s):
R. Possamai Bastos
◽
F. Sill Torres
◽
J.-M. Dutertre
◽
M.-L. Flottes
◽
G. Di Natale
◽
...
Keyword(s):
Fault Attacks
Download Full-text
Malicious circuitry detection using fast timing characterization via test points
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581575
◽
2013
◽
Cited By ~ 7
Author(s):
Sheng Wei
◽
Miodrag Potkonjak
Keyword(s):
Fast Timing
◽
Test Points
Download Full-text
Stability analysis of a physical unclonable function based on metal resistance variations
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581580
◽
2013
◽
Cited By ~ 8
Author(s):
J. Ju
◽
R. Chakraborty
◽
C. Lamech
◽
J. Plusquellic
Keyword(s):
Stability Analysis
◽
Metal Resistance
◽
Physical Unclonable Function
Download Full-text
Novel strong PUF based on nonlinearity of MOSFET subthreshold operation
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581558
◽
2013
◽
Cited By ~ 24
Author(s):
Mukund Kalyanaraman
◽
Michael Orshansky
Keyword(s):
Subthreshold Operation
Download Full-text
Model building attacks on Physically Unclonable Functions using genetic programming
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581563
◽
2013
◽
Cited By ~ 15
Author(s):
Indrasish Saha
◽
Ratan Rahul Jeldi
◽
Rajat Subhra Chakraborty
Keyword(s):
Genetic Programming
◽
Model Building
◽
Physically Unclonable Functions
Download Full-text
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581573
◽
2013
◽
Cited By ~ 28
Author(s):
Yier Jin
◽
Bo Yang
◽
Yiorgos Makris
Keyword(s):
Information Assurance
◽
Accurate Information
◽
Signal Sensitivity
Download Full-text
Cloning Physically Unclonable Functions
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581556
◽
2013
◽
Cited By ~ 119
Author(s):
Clemens Helfmeier
◽
Christian Boit
◽
Dmitry Nedospasov
◽
Jean-Pierre Seifert
Keyword(s):
Physically Unclonable Functions
Download Full-text
Hardware implementations of the WG-5 cipher for passive RFID tags
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581561
◽
2013
◽
Cited By ~ 4
Author(s):
Mark D. Aagaard
◽
Guang Gong
◽
Rajesh K. Mota
Keyword(s):
Rfid Tags
◽
Hardware Implementations
◽
Passive Rfid
Download Full-text
Structural transformation for best-possible obfuscation of sequential circuits
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
◽
10.1109/hst.2013.6581566
◽
2013
◽
Cited By ~ 25
Author(s):
Li Li
◽
Hai Zhou
Keyword(s):
Structural Transformation
◽
Sequential Circuits
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close