Fault Analysis-Based Logic Encryption
暂无分享,去创建一个
Jeyavijayan Rajendran | Ramesh Karri | Ozgur Sinanoglu | Huan Zhang | Garrett S. Rose | Chi Zhang | Youngok Pino | O. Sinanoglu | R. Karri | G. Rose | Chi Zhang | Huan Zhang | Jeyavijayan Rajendran | Youngok Pino
[1] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[2] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[3] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[4] Howard M. Heys,et al. Avalanche Characteristics of Substitution-Permutation Encryption Networks , 1995, IEEE Trans. Computers.
[5] Kaushik Roy,et al. CLIP: Circuit Level IC Protection Through Direct Injection of Process Variations , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[6] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[7] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[8] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[9] Jeyavijayan Rajendran,et al. Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach , 2013, IEEE Design & Test.
[10] Miodrag Potkonjak,et al. Behavioral synthesis techniques for intellectual property protection , 2005, TODE.
[11] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[12] Daniela Fischer,et al. Digital Design And Computer Architecture , 2016 .
[13] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[14] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[15] W. R. Daasch,et al. IC identification circuit using device mismatch , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).
[16] Swarup Bhunia,et al. Security against hardware Trojan through a novel application of design obfuscation , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[17] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[18] Dong Sam Ha,et al. HOPE: an efficient parallel fault simulator for synchronous sequential circuits , 1992, DAC '92.
[19] Miodrag Potkonjak,et al. Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[20] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[21] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.