共 50 条
- [1] Testability of cryptographic hardware and detection of Hardware Trojans [J]. Proceedings of the Asian Test Symposium, 2011, : 517 - 524
- [2] A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware [J]. 2021 IEEE 51ST INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2021), 2021, : 154 - 159
- [3] Hardware Trojans in Wireless Cryptographic ICs [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 26 - 35
- [4] Hardware Trojans in Wireless Cryptographic ICs: Silicon Demonstration & Detection Method Evaluation [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2013, : 399 - 404
- [5] Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware [J]. 2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 18 - 28
- [6] Locating Hardware Trojans Using Combinatorial Testing for Cryptographic Circuits [J]. IEEE ACCESS, 2022, 10 : 18787 - 18806
- [8] An Unsupervised Detection Approach for Hardware Trojans [J]. IEEE ACCESS, 2020, 8 : 158169 - 158183
- [9] Summary of Locating Hardware Trojans using Combinatorial Testing for Cryptographic Circuits [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, : 260 - 262
- [10] Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 467 - 472