516 | -- | 0 | Tim Cheng. Trustworthy ICs for secure embedded computing |
518 | -- | 520 | Patrick Schaumont, Anand Raghunathan. Guest Editors Introduction: Security and Trust in Embedded-Systems Design |
522 | -- | 533 | Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, Leif Uhsadel. A Survey of Lightweight-Cryptography Implementations |
534 | -- | 0 | Kevin Schutz. OEM Component Authentication |
535 | -- | 543 | Thomas Popp, Stefan Mangard, Elisabeth Oswald. Power Analysis Attacks and Countermeasures |
544 | -- | 545 | Chong Hee Kim, Jean-Jacques Quisquater. Faults, Injection Methods, and Fault Attacks |
546 | -- | 555 | Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu. Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors |
556 | -- | 569 | Hamad Alrimeih, Daler N. Rakhmatov. Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware |
570 | -- | 580 | G. Edward Suh, Charles W. O Donnell, Srinivas Devadas. Aegis: A Single-Chip Secure Processor |
581 | -- | 0 | Steve Trimberger. Security in SRAM FPGAs |
582 | -- | 591 | Peter Wilson, Alexandre Frey, Tom Mihm, Danny Kershaw, Tiago Alves. Implementing Embedded Security on Dual-Virtual-CPU Systems |
592 | -- | 0 | Tom Mihm. Protecting Critical Data |
594 | -- | 595 | Victor Berman. DASC standards track IP-based design trends |
596 | -- | 597 | Grant Martin. Making a List...Checking it Twice |
603 | -- | 0 | Joe Damore. DATC Newsletter |
605 | -- | 0 | Bruce C. Kim. TTTC Newsletter |
624 | -- | 0 | Mel Breuer. Tesla and AND gates |