共 9 条
[1]
Yang Beta., Wu Kappa., Karri R., Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard, pp. 339-344, (2004)
[2]
Yang Beta., Karri R., Wu Kappa., Secure Scan: A Design-for-Test Architecture for Crypto Chips, pp. 135-140, (2005)
[3]
Novak F., Biasizzo A., Security Extension for IEEE Std 1149.1, J. Electronic Testing, 22, 3, pp. 301-303, (2006)
[4]
Suh G., Devadas S., Physical Unclonable Functions for Device Authentication and Secret Key Generation, pp. 9-14, (2007)
[5]
(2006)
[6]
Arazi Beta., Message Authentication in Computationally Constrained Environments, IEEE Trans. Mobile Computing, 8, 7, pp. 968-974, (2009)
[7]
Lai X., Rueppel R., Woollven J., Advances in Cryptology AusCrypt, pp. 339-348, (1992)
[8]
Fwaggle
[9]
Jin Y., Makris Y., Hardware Trojan Detection Using Path Delay Fingerprint, pp. 51-57, (2008)