IoT: Source of test challenges
暂无分享,去创建一个
Mario Konijnenburg | Yervant Zorian | Erik Jan Marinissen | Jeroen Delvaux | Ingrid Verbauwhede | Chih-Tsun Huang | Dave Singelée | Ping-Hsuan Hsieh | Bohan Yang | Robert Van Rijsinge | Cedric Mayor | Vladimir Rozic | Peter Cockburn | Cocoy Reyes | Y. Zorian | Vladimir Rožić | I. Verbauwhede | E. Marinissen | Ping-Hsuan Hsieh | Bohan Yang | Chih-Tsun Huang | M. Konijnenburg | Dave Singelée | Jeroen Delvaux | Peter Cockburn | Cedric Mayor | R. V. Rijsinge | Cocoy Reyes
[1] Ping-Hsuan Hsieh,et al. An RF Energy Harvester With 44.1% PCE at Input Available Power of -12 dBm , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.
[2] C. P. Ravikumar,et al. Test Strategies for Low Power Devices , 2008, 2008 Design, Automation and Test in Europe.
[3] Wayne P. Burleson,et al. On-chip lightweight implementation of reduced NIST randomness test suite , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[4] Erik Jan Marinissen,et al. IEEE Std P1838: DfT standard-under-development for 2.5D-, 3D-, and 5.5D-SICs , 2016, 2016 21th IEEE European Test Symposium (ETS).
[5] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[6] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[7] Ingrid Verbauwhede,et al. TOTAL: TRNG on-the-fly testing for attack detection using Lightweight hardware , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[8] Ingrid Verbauwhede,et al. Low-cost implementations of on-the-fly tests for random number generators , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[9] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[10] Philip Heng Wai Leong,et al. Towards a unique FPGA-based identification circuit using process variations , 2009, 2009 International Conference on Field Programmable Logic and Applications.
[11] Tanja Lange,et al. Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..
[12] Refet Firat Yazicioglu,et al. 28.4 A battery-powered efficient multi-sensor acquisition system with simultaneous ECG, BIO-Z, GSR, and PPG , 2016, 2016 IEEE International Solid-State Circuits Conference (ISSCC).
[13] John Kelsey,et al. Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .
[14] Sandip Ray,et al. The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.
[15] Chi-En Daniel Yin,et al. Obtaining Statistically Random Information From Silicon Physical Unclonable Functions , 2014, IEEE Transactions on Emerging Topics in Computing.
[16] Refet Firat Yazicioglu,et al. 18.3 A multi-parameter signal-acquisition SoC for connected personal health applications , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).
[17] Ingrid Verbauwhede,et al. Embedded HW/SW platform for on-the-fly testing of true random number generators , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[18] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[19] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[20] Arjen K. Lenstra,et al. Public Keys , 2012, CRYPTO.
[21] Dawu Gu,et al. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[22] Swaroop Ghosh,et al. A family of Schmitt-Trigger-based arbiter-PUFs and selective challenge-pruning for robustness and quality , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[23] Yervant Zorian,et al. An Effective Multi-Chip BIST Scheme , 1997, J. Electron. Test..
[24] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[25] Julien Penders,et al. Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.
[26] Olivier Sentieys,et al. On-line monitoring of Random Number Generators for embedded security , 2009, 2009 IEEE International Symposium on Circuits and Systems.