264 papers found
Refreshing results…
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA
Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Safe is the new Smart: PUF-based Authentication for Load Modification-Resistant Smart Meters
Cryptographically Secure Multi-tenant Provisioning of FPGAs
In-situ Extraction of Randomness from Computer Architecture Through Hardware Performance Counters
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction
Hardware Security in India: The Journey so Far
3PAA: A Private PUF Protocol for Anonymous Authentication
Performance, Security Tradeoffs in Secure Control
Power Efficiency of S-Boxes: From a Machine-Learning-Based Tool to a Deterministic Model
Guest Editorial: Special Section on Autonomous Intelligence for Security and Privacy Analytics
Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips
Guest Editorial Special Section on Security Challenges and Solutions With Emerging Computing Technologies
Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs
SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations
High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves
An automated framework for exploitable fault identification in block ciphers
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders
Combining PUF with RLUTs
Missing publications? Read more about our data sources.