共 37 条
[1]
Bar-El H(2006)The sorcerer’s apprentice guide to fault attacks Proc IEEE 94 2 370-382
[2]
Choukri H(2016)A survey of man in the middle attacks IEEE Commun Surv Tutorials 18 2027-2051
[3]
Naccache D(2009)A reliable architecture for parallel implementations of the advanced encryption standard J Electron Test 25 269-278
[4]
Tunstall M(2015)Strengthening SIMON implementation against intelligent fault attacks IEEE Embed Syst Lett 7 113-116
[5]
Whelan C(2017)Exploiting hardware vulnerabilities to attack embedded system devices: a survey of potent microarchitectural attacks Electronics 6 2079-9292
[6]
Conti M(2004)Identification and authentication of integrated circuits: research articles Concurr Comput Pract Exper 16 1077-1098
[7]
Dragoni N(2014)Physical Unclonable functions and applications: a tutorial Proc IEEE 102 1126-1141
[8]
Lesyk V(2011)Descriptional and computational complexity of finite automata: ÂĂÂT̆A survey Inf Comput 209 456-470
[9]
Di Natale DMRG(2002)Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers IEEE Trans Comput-Aided Des Integr Circ Syst 21 1509-1517
[10]
Doulcier M(1983)An empirical model for device degradation due to hot-carrier injection IEEE Electron Device Lett 4 111-113