Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Microelectronic Security
biblio
The undetectable clock cycle sensitive hardware trojan
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Hardware
Trusted design
Trojan horses
trees (mathematics)
Resiliency
resilience
redundant circuits
pubcrawl
Microelectronic Security
Metrics
invasive software
HT
Hardware Trojans
Circuit faults
FSM
finite state machines
finite state machine
embedded systems
embedded clock-cycle-sensitive hardware trojans
delays
Cryptography chips
Cryptography
critical path
composability
Clocks
clock tree structure
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM
biblio
Hardware malicious circuit identification using self referencing approach
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
post-silicon testing
Trojan horses
testing
Test vector generation
Temporal Self Referencing
side channel analysis
sequential Trojans
Sequential trojan
self referencing approach
security vulnerabilities
Robust Trojans
Resiliency
resilience
pubcrawl
Power measurement
composability
Payloads
outsourced products
Microelectronic Security
Metrics
malicious inclusions
logic testing
leakage power
invasive software
hardware Trojan detection sensitivity
hardware malicious circuit identification
Hardware
delays
Cryptography
biblio
Fully integrable current-mode feedback suppressor as an analog countermeasure against CPA attacks in 40nm CMOS technology
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Power demand
Logic gates
Metrics
Microelectronic Security
MTD improvement
on-chip analog-level CPA countermeasure
Power Analysis Attack
power aware computing
power consumption
IoT
pubcrawl
resilience
Resiliency
sensible data security
side channel attack
size 40 nm
system-on-chip
ultraconstrained IoT smart devices
CPA
circuit feedback
CMOS
CMOS analogue integrated circuits
CMOS logic circuits
CMOS technology
composability
correlation coefficient
correlation power analysis
Analog-level
CPA attacks
CPA-resistant cryptographic devices
Cryptography
current-mode
current-mode circuits
data-dependency
fully integrable current-mode feedback suppressor
Internet of Things
biblio
DPA on Hardware Implementations of Ascon and Keyak
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Microelectronics Security
Ascon
composability
Differential Power Analysis
Hardware implementations
Keccak
Keyak
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
biblio
Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Microelectronics Security
composability
lightweight block cipher
Linear Feedback Shift Register (LFSR)
low-resource embedded devices
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Security analysis
software implementation
XTEA
biblio
A Formal Foundation for Secure Remote Execution of Enclaves
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Microelectronics Security
composability
confidentiality
Enclave Programs
formal verification
integrity
Metrics
Microelectronic Security
pubcrawl
Remote Attestation
resilience
Resiliency
Secure computation
biblio
Side-channel collision attack based on multiple-bits
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
AES
Algorithm design and analysis
collision attack
composability
encryption
Euclidean distance
field programmable gate arrays
Hardware
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Side-channel attack
side-channel attacks
biblio
Enhancing magnetic IEDs detection method utilizes an AMR-based magnetic field sensor
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Magnetometery
Resiliency
resilience
pubcrawl
Perpendicular magnetic anisotropy
Nonlinear distortion
Microelectronic Security
Metrics
Magnets
AMR sensor
Magnetometers
magnetic devices
Magnetic circuits
Iterations
Improvised Explosive Device (IED)
composability
calibration
biblio
Reliability, availability and security of computer systems supported by RFID technology
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
quantitative indicators
software reliability
Software
security of data
security
RFID technology
Resiliency
resilience
Reliability
radiofrequency identification
composability
pubcrawl
Microelectronic Security
Metrics
Hardware
Computers
computer systems security
computer systems reliability
computer systems availability
computer system quality
1
2
next ›
last »