共 26 条
[1]
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
[J].
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS,
2008,
:505-510
[3]
A Single-Configuration Method for Application-Dependent Testing of SRAM-based FPGA Interconnects
[J].
2011 20TH ASIAN TEST SYMPOSIUM (ATS),
2011,
:444-450
[4]
Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs
[J].
2020 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2020),
2020,
:103-111
[6]
Elnaggar R, 2019, DES AUT TEST EUROPE, P7, DOI [10.23919/date.2019.8714904, 10.23919/DATE.2019.8714904]
[7]
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1728-1741
[8]
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs
[J].
2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL),
2019,
:45-50
[9]
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires
[J].
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18),
2018,
:15-27
[10]
Glamocanin O, 2020, DES AUT TEST EUROPE, P1007, DOI 10.23919/DATE48585.2020.9116481