Abstract is missing.
- An ultra-low overhead LUT-based PUF for FPGAJiadong Wang, Aijiao Cui, Mengyang Li, Gang Qu, Huawei Li. 1-6 [doi]
- Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCsMd. Tauhidur Rahman, Domenic Forte, Xiaoxiao Wang, Mark Tehranipoor. 1-6 [doi]
- Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bitsJunichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto. 1-6 [doi]
- On-chip substrate-bounce monitoring for laser-fault countermeasureKohei Matsuda, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Tatsuya Fujii, Kazuo Sakiyama. 1-6 [doi]
- Defeating drone jamming with hardware sandboxingJoshua Mead, Christophe Bobda, Taylor J. L. Whitaker. 1-6 [doi]
- Key extraction from the primary side of a switched-mode power supplySami Saab, Andrew Leiserson, Michael Tunstall. 1-7 [doi]
- Test generation for combinational hardware TrojansSying-Jyan Wang, Jhih-Yu Wei, Shih-Heng Huang, Katherine Shu-Min Li. 1-6 [doi]
- Transistor-level camouflaged logic locking method for monolithic 3D IC securityJaya Dofe, Chen Yan, Scott Kontak, Emre Salman, Qiaoyan Yu. 1-6 [doi]
- Comparing Sboxes of ciphers from the perspective of side-channel attacksLiran Lerman, Olivier Markowitch, Nikita Veshchikov. 1-6 [doi]
- How secure is split manufacturing in preventing hardware trojan?Zhang Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin. 1-6 [doi]
- Sneak path enabled authentication for memristive crossbar memoriesMd. Badruddoja Majumder, Mesbah Uddin, Garrett S. Rose, Jeyavijayan Rajendran. 1-6 [doi]
- Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitorsSyed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. 1-6 [doi]
- Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curvesPoulami Das 0003, Debapriya Basu Roy, Harishma Boyapally, Debdeep Mukhopadhyay. 1-6 [doi]
- Echeloned IJTAG data protectionSenwen Kan, Jennifer Dworak, James George Dunham. 1-6 [doi]
- Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFsJeroen Delvaux, Dawu Gu, Ingrid Verbauwhede. 1-6 [doi]
- A new approach for root-causing attacks on digital microfluidic devicesPushpita Roy, Ansuman Banerjee. 1-6 [doi]
- Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryptionAesun Park, Dong-Guk Han. 1-6 [doi]
- Aging attacks for key extraction on permutation-based obfuscationZimu Guo, Mark M. Tehranipoor, Domenic Forte. 1-6 [doi]
- RPUF: Physical Unclonable Function with Randomized Challenge to resist modeling attackJing Ye, Yu Hu, Xiaowei Li. 1-6 [doi]
- RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware TrojanTravis E. Schulze, Kevin A. Kwiat, Charles A. Kamhoua, Shih-Chieh Chang, Yiyu Shi. 1-6 [doi]
- A new event-driven Dynamic Vision Sensor based Physical Unclonable Function for camera authentication in reactive monitoring systemYue Zheng, Yuan Cao, Chip-Hong Chang. 1-6 [doi]
- Error detection reliable architectures of Camellia block cipher applicable to different variants of its substitution boxesMehran Mozaffari Kermani, Reza Azarderakhsh, Jiafeng Xie. 1-6 [doi]
- An enhanced classification-based golden chips-free hardware Trojan detection techniqueMingfu Xue, Jian Wang, Aiqun Hu. 1-6 [doi]
- Using image sensor PUF as root of trust for birthmarking of perceptual image hashYuan Cao, Le Zhang, Chip-Hong Chang. 1-6 [doi]