Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2014
- Sk Subidh Ali, Ozgur Sinanoglu, Samah Mohamed Saeed, Ramesh Karri:
New scan attacks against state-of-the-art countermeasures and DFT. HOST 2014: 142-147 - Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm:
A look into SIMON from a side-channel perspective. HOST 2014: 56-59 - Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu, David Naccache, Xuan Thuy Ngo:
Cryptographically secure shields. HOST 2014: 25-31 - Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
Increasing the efficiency of laser fault injections using fast gate level reverse engineering. HOST 2014: 60-63 - Siva Nishok Dhanuskodi, Arunkumar Vijayakumar, Sandip Kundu:
A Chaotic Ring oscillator based Random Number Generator. HOST 2014: 160-165 - Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, Jean-Luc Danger:
Side-channel leakage on silicon substrate of CMOS cryptographic chip. HOST 2014: 32-37 - Kamil Gomina, Jean-Baptiste Rigaud, Philippe Gendrier, Philippe Candelier, Assia Tria:
Power supply glitch attacks: Design and evaluation of detection circuits. HOST 2014: 136-141 - Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
NREPO: Normal basis Recomputing with Permuted Operands. HOST 2014: 118-123 - Dylan Ismari, Jim Plusquellic:
IP-level implementation of a resistance-based physical unclonable function. HOST 2014: 64-69 - Anirudh Iyengar, Kenneth Ramclam, Swaroop Ghosh:
DWM-PUF: A low-overhead, memory-based security primitive. HOST 2014: 154-159 - Meenatchi Jagasivamani, Peter Gadfort, Michel Sika, Michael Bajura, Michael Fritze:
Split-fabrication obfuscation: Metrics and techniques. HOST 2014: 7-12 - Patrick Koeberl, Jiangtao Li, Anand Rajan, Wei Wu:
Entropy loss in PUF-based key generation schemes: The repetition code pitfall. HOST 2014: 44-49 - Sava Krstic, Jin Yang, David W. Palmer, Randy B. Osborne, Eran Talmor:
Security of SoC firmware load protocols. HOST 2014: 70-75 - Raghavan Kumar, Wayne P. Burleson:
On design of a highly secure PUF based on non-linear current mirrors. HOST 2014: 38-43 - Roel Maes, Vincent van der Leest:
Countering the effects of silicon aging on SRAM PUFs. HOST 2014: 148-153 - Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz:
Experimental evaluation of two software countermeasures against fault attacks. HOST 2014: 112-117 - Kotaro Okamoto, Naofumi Homma, Takafumi Aoki, Sumio Morioka:
A hierarchical formal approach to verifying side-channel resistant cryptographic processors. HOST 2014: 76-79 - Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic:
Optimality and beyond: The case of 4×4 S-boxes. HOST 2014: 80-83 - Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor:
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. HOST 2014: 50-55 - Oliver Soll, Thomas Korak, Michael Muehlberghuber, Michael Hutter:
EM-based detection of hardware trojans on FPGAs. HOST 2014: 84-87 - Merrielle Spain, Benjamin Fuller, Kyle Ingols, Robert K. Cunningham:
Robust keys from physical unclonable functions. HOST 2014: 88-92 - Franco Stellari, Peilin Song, Alan J. Weger, Jim Culp, A. Herbert, Dirk Pfeiffer:
Verification of untrusted chips using trusted layout and emission measurements. HOST 2014: 19-24 - Mostafa M. I. Taha, Patrick Schaumont:
Side-channel countermeasure for SHA-3 at almost-zero area overhead. HOST 2014: 93-96 - Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A frequency leakage model for SCA. HOST 2014: 97-100 - Kaushik Vaidyanathan, Bishnu Prasad Das, Huseyin Ekin Sumbul, Renzhi Liu, Larry T. Pileggi:
Building trusted ICs using split fabrication. HOST 2014: 1-6 - Kaushik Vaidyanathan, Renzhi Liu, Huseyin Ekin Sumbul, Qiuling Zhu, Franz Franchetti, Larry T. Pileggi:
Efficient and secure intellectual property (IP) design with split fabrication. HOST 2014: 13-18 - Kan Xiao, Md. Tauhidur Rahman, Domenic Forte, Yu Huang, Mei Su, Mohammad Tehranipoor:
Bit selection algorithm suitable for high-volume production of SRAM-PUF. HOST 2014: 101-106 - Norimasa Yoshimizu:
Hardware trojan detection by symmetry breaking in path delays. HOST 2014: 107-111 - Meng-Day (Mandel) Yu, David M'Raïhi, Ingrid Verbauwhede, Srinivas Devadas:
A noise bifurcation architecture for linear additive physical functions. HOST 2014: 124-129 - Loïc Zussa, Jean-Max Dutertre, Jessy Clédière, Bruno Robisson:
Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter. HOST 2014: 130-135
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-18 11:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint