共 50 条
- [21] Flexible High Performance Architecture For Boundary Scan Execution Hardware [J]. 2015 IEEE AUTOTESTCON, 2015, : 232 - 235
- [22] Testability of Cryptographic Hardware and Detection of Hardware Trojans [J]. 2011 20TH ASIAN TEST SYMPOSIUM (ATS), 2011, : 517 - 524
- [23] Testability of cryptographic hardware and detection of Hardware Trojans [J]. Proceedings of the Asian Test Symposium, 2011, : 517 - 524
- [25] Asynchronous cryptographic hardware design [J]. 2006: 40th Annual IEEE International Carnahan Conferences Security Technology, Proceedings, 2006, : 221 - 227
- [26] Hardware Design of Cryptographic Accelerator [J]. 2018 IEEE 16TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2018): DEDICATED TO THE MEMORY OF PIONEER OF ROBOTICS ANTAL (TONY) K. BEJCZY, 2018, : 201 - 206
- [27] Boundary-scan technology and its application in hardware experiment system [J]. ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 3, 2005, : 228 - 231
- [28] Using General Purpose Digital Hardware To Perform Boundary Scan Tests [J]. IEEE AUTOTESTCON 2011: SYSTEMS READINESS TECHNOLOGY CONFERENCE, 2011, : 328 - 332
- [29] A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware [J]. 2021 IEEE 51ST INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2021), 2021, : 154 - 159
- [30] The Security of Cryptographic Hashes [J]. PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 103 - 108