Abstract is missing.
- Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic AlgorithmRei Kudo, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li 0001. 1-6 [doi]
- Ultra Freezing Attacks and Clock Glitching of Clock Oscillator CircuitsJonathon Durand, Anisul Abedin, Jakub Szefer. 1-6 [doi]
- On Entropy and Bit Patterns of Ring Oscillator JitterMarkku-Juhani O. Saarinen. 1-6 [doi]
- A Backpropagation Extreme Learning Machine Approach to Fast Training Neural Network-Based Side-Channel AttackXuyang Huang, Ming Ming Wong, Anh-Tuan Do, Wang Ling Goh. 1-6 [doi]
- An Ultra-Low Power 3-T Chaotic Map based True Random Number GeneratorLijuan Han, Yuan Cao 0003, Lei Qian, Haodong Xie, Chip-Hong Chang. 1-6 [doi]
- Deep Learning Side-Channel Attacks Against Lightweight SCA Countermeasure RSM-AESYuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino. 1-6 [doi]
- Security Risk Assessment of Server Hardware Architectures Using Graph AnalysisSandhya Koteshwara. 1-4 [doi]
- Binary Classification-Based Side-Channel AnalysisChi Zhang, Xiangjun Lu, Dawu Gu. 1-6 [doi]
- SSEL: An Extensible Specification Language for SoC SecurityKshitij Raj, Arrush Hegde, Atul Prasad Deb Nath, Swarup Bhunia, Sandip Ray. 1-6 [doi]
- The logic obfuscation of LFSR with the crosstalk based polymorphic gateYuqian Sun, Xiaole Cui, Yongliang Chen, Xiaoxin Cui. 1-6 [doi]
- Last-Round and Joint First/Last-Round Power Analysis Attacks on PRESENTQiang Fang, Massimo Alioto. 1-6 [doi]
- Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply ChainChandan Kumar Chaudhary, Urbi Chatterjee, Debdeep Mukhopadhayay. 1-4 [doi]
- Detecting Adversarial Examples Utilizing Pixel Value DiversityJinxin Dong, Pingqiang Zhou. 1-6 [doi]
- A Novel Circuit Authentication Scheme Based on Partial Polymorphic GatesTimothy Dunlap, Omid Aramoon, Gang Qu 0001, Tian Wang, Xiaoxin Cui, Dunshan Yu. 1-4 [doi]
- From FPGAs to Obfuscated eASICs: Design and Security Trade-offsZain Ul Abideen, Tiago Diadami Perez, Samuel Pagliarini. 1-4 [doi]
- A Correlation Fault Attack on Rotating S-Box Masking AESXingxin Wang, Jian Zheng, Lingjuan Wu, Jiacheng Zhu, Wei Hu 0008. 1-6 [doi]
- Attention - Based Non-Profiled Side-Channel AttackXiangjun Lu, Chi Zhang, Dawu Gu. 1-6 [doi]
- Hardware Trojans Detection Through RTL Features Extraction and Machine LearningJizhong Yang, Ying Zhang, Yifeng Hua, Jiaqi Yao, Zhiming Mao, Xin Chen. 1-4 [doi]
- Pipelined High-Throughput NTT Architecture for Lattice-Based CryptographyWeihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi. 1-4 [doi]
- Revisiting UAV Authentication Schemes: Practical Attacks on Aviation InfrastructureHirak Mondal, Urbi Chatterjee. 1-6 [doi]