共 50 条
- [31] From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications 2012 IEEE/ACM 45TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE WORKSHOPS, 2012, : 1 - 8
- [32] Testability of Cryptographic Hardware and Detection of Hardware Trojans 2011 20TH ASIAN TEST SYMPOSIUM (ATS), 2011, : 517 - 524
- [33] Testability of cryptographic hardware and detection of Hardware Trojans Proceedings of the Asian Test Symposium, 2011, : 517 - 524
- [34] Some applications of polynomials for the design of cryptographic protocols SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
- [36] Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 237 - 242
- [37] Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 467 - 472
- [38] Security and cryptographic hardware implementations Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769