0 | -- | 0 | Shahed E. Quadir, JunLin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang 0003, John Chandy, Mark Tehranipoor. A Survey on Chip to System Reverse Engineering |
0 | -- | 0 | Arighna Deb, Robert Wille, Oliver Keszocze, Stefan Hillmich, Rolf Drechsler. Gates vs. Splitters: Contradictory Optimization Objectives in the Synthesis of Optical Circuits |
0 | -- | 0 | Stephan De Castro, Jean-Max Dutertre, Bruno Rouzeyre, Giorgio Di Natale, Marie-Lise Flottes. Frontside Versus Backside Laser Injection: A Comparative Study |
0 | -- | 0 | Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella. A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure |
0 | -- | 0 | Jayita Das, Kevin Scott, Sanjukta Bhanja. MRAM PUF: Using Geometric and Resistive Variations in MRAM Cells |
0 | -- | 0 | Amey M. Kulkarni, Youngok Pino, Matthew French, Tinoosh Mohsenin. Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques |
0 | -- | 0 | Elena Ioana Vatajelu, Giorgio Di Natale, Mario Barbareschi, Lionel Torres, Marco Indaco, Paolo Prinetto. STT-MRAM-Based PUF Architecture Exploiting Magnetic Tunnel Junction Fabrication-Induced Variability |
0 | -- | 0 | Anirudh Iyengar, Swaroop Ghosh, Kenneth Ramclam, Jae-Won Jang, Cheng-Wei Lin. Spintronic PUFs for Security, Trust, and Authentication |
0 | -- | 0 | Yu Bi, Kaveh Shamsi, Jiann-shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, Xiaobo Sharon Hu, Michael T. Niemier, Yier Jin. Emerging Technology-Based Design of Primitives for Hardware Security |
0 | -- | 0 | Ozgur Sinanoglu, Ramesh Karri. Guest Editorial Special Issue on Secure and Trustworthy Computing |
0 | -- | 0 | Yingjie Lao, Qianying Tang, Chris H. Kim, Keshab K. Parhi. Beat Frequency Detector-Based High-Speed True Random Number Generators: Statistical Modeling and Analysis |