Optimized linear complementary codes implementation for hardware trojan prevention
暂无分享,去创建一个
Claude Carlet | Sylvain Guilley | Jean-Luc Danger | Zakaria Najm | Xuan Thuy Ngo | Cédric Tavernier | Abderrahman Daif | Thibault Porteboeuf | C. Carlet | X. Ngo | J. Danger | S. Guilley | A. Daif | Zakaria Najm | C. Tavernier | Thibault Porteboeuf
[1] Sylvain Guilley,et al. Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[2] Mark Mohammad Tehranipoor,et al. Hardware Trojan Horses , 2010, Towards Hardware-Intrinsic Security.
[3] Claude Carlet,et al. Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks , 2014, WISTP.
[4] Sylvain Guilley,et al. Hardware Trojan Horses in Cryptographic IP Cores , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[5] Lee-Ad Gottlieb,et al. Matrix Sparsification and the Sparse Null Space Problem , 2010, Algorithmica.
[6] Claude Carlet,et al. Complementary dual codes for counter-measures to side-channel attacks , 2016, Adv. Math. Commun..