共 45 条
- [1] [Anonymous], 2014, EXPR BENCHM SUIT
- [2] [Anonymous], 2000, WATER SCI, DOI DOI 10.1007/S13201-020-01352-7
- [3] Auger A, 2009, FOGA'09: PROCEEDINGS OF THE 10TH ACM SIGRVO CONFERENCE ON FOUNDATIONS OF GENETIC ALGORITHMS, P87
- [4] Banga Mainak, 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P56, DOI 10.1109/HST.2010.5513114
- [7] Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
- [8] Hardware Trojan Horses in Cryptographic IP Cores [J]. 2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 15 - 29
- [9] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247