114 papers found
Refreshing results…
Deep Learning-based Hardware Trojan Detection with Block-based Netlist Information Extraction
A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities
Fast DRAM PUFs on Commodity Devices
High Performance Modular Multiplication for SIDH
Security Analysis of Hardware Trojans on Approximate Circuits
Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis?
Ten years of hardware Trojans: a survey from the attacker's perspective
Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA
An Efficient and Parallel R-LWE Cryptoprocessor
A Secure Algorithm for Rounded Gaussian Sampling
Lightweight Configurable Ring Oscillator PUF based on RRAM/CMOS Hybrid Circuits
Resource-Shared Crypto-Coprocessor of AES Enc/Dec With SHA-3
Optimized Schoolbook Polynomial Multiplication for Compact Lattice-Based Cryptography on FPGA
Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman
An Improved Automatic Hardware Trojan Generation Platform
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Multi-Incentive Delay-Based (MID) PUF
XOR-Based Low-Cost Reconfigurable PUFs for IoT Security
A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations
Missing publications? Read more about our data sources.