共 50 条
[2]
[Anonymous], 2013, P ACM SIGSAC C COMP, P697
[3]
Bao C, 2015, INT SYM QUAL ELECT, P47
[4]
Bao Chongxi, 2018, The Hardware Trojan War, P269
[6]
Hardware Trojan Horses in Cryptographic IP Cores
[J].
2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013),
2013,
:15-29
[8]
Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
[10]
Dhavlle A., 2021, PROC IEEE INT S CIRC, P1