X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
engineering sciences (8) 8
[ spi.nano ] engineering sciences [physics]/micro and nanotechnologies/microelectronics (7) 7
cryptography (7) 7
micro and nanotechnologies (7) 7
microelectronics (7) 7
field programmable gate arrays (5) 5
1700-1799 (4) 4
circuit faults (4) 4
clocks (4) 4
german literature (4) 4
aes (3) 3
computer science (3) 3
computer science, theory & methods (3) 3
energy consumption (3) 3
engineering, electrical & electronic (3) 3
fault attacks (3) 3
laboratories (3) 3
smart cards (3) 3
sram-based fpga (3) 3
[ spi ] engineering sciences [physics] (2) 2
application specific integrated circuits (2) 2
cpa (2) 2
ddr (2) 2
dpa (2) 2
electromagnetic analysis (2) 2
embedded systems (2) 2
encryption (2) 2
fault attack (2) 2
fault injection (2) 2
gaussian noise (2) 2
generators (2) 2
hardware (2) 2
indium phosphide (2) 2
laser (2) 2
laser fault injections (2) 2
noise (2) 2
power supplies (2) 2
power supply glitch (2) 2
protection (2) 2
schubart, christian friedrich daniel (2) 2
security (2) 2
signal analysis (2) 2
timing (2) 2
'dpa-like' analysis (1) 1
3d integration (1) 1
[ info.info-cr ] computer science [cs]/cryptography and security [cs.cr] (1) 1
[spi.nano]engineering sciences [physics]/micro and nanotechnologies/microelectronics (1) 1
[spi]engineering sciences [physics] (1) 1
accelerators (1) 1
accreditation (1) 1
algorithms (1) 1
analysis (1) 1
application software (1) 1
application specific integrated circuit (1) 1
application-specific integrated circuits (1) 1
augsburg (1) 1
autocorrelation (1) 1
backside (1) 1
banking (1) 1
biochemistry & molecular biology (1) 1
cavity resonators (1) 1
certification (1) 1
channels (1) 1
circuits (1) 1
circuits and systems (1) 1
claudius, matthias (1) 1
coding and information theory (1) 1
combinatorics (1) 1
communications engineering, networks (1) 1
computational mathematics and numerical analysis (1) 1
computer communication networks (1) 1
computer hacking (1) 1
computer-aided engineering and design (1) 1
configuration (1) 1
configuration errors (1) 1
correlation (1) 1
correlation power analysis (1) 1
countermeasure (1) 1
coupling circuits (1) 1
criticism (1) 1
cryptography and security (1) 1
custom integrated circuits (1) 1
cybersecurity (1) 1
dangerous (1) 1
data encryption (1) 1
data encryption standard (1) 1
datensicherheit (1) 1
decision support systems (1) 1
delay-based countermeasure (1) 1
delays (1) 1
dema (1) 1
des (1) 1
detectors (1) 1
deviation (1) 1
die deutsche chronik (1) 1
differential power analysis (1) 1
digital integrated circuits (1) 1
dissolved gas analysis (1) 1
educational institutions (1) 1
electrical engineering (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Electronic Testing, ISSN 0923-8174, 6/2013, Volume 29, Issue 3, pp. 367 - 381
Journal Article
Proceedings - Electronic Components and Technology Conference, ISSN 0569-5503, 08/2018, Volume 2018-, pp. 515 - 520
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2006, Volume 4249, pp. 174 - 186
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as... 
PPA | Correlation | DES | DPA | CPA | Power analysis | Multi-bit DPA | Side channel | AES | side channel | correlation | SECURITY | COMPUTER SCIENCE, THEORY & METHODS | multi-bit DPA | power analysis
Conference Proceeding
2009 27th IEEE VLSI Test Symposium, ISSN 1093-0167, 05/2009, pp. 327 - 332
SRAM-based FPGAs are an appealing platform to implement many systems, including secure ones. However, secure systems are subject to attacks and one of the main... 
System testing | Laboratories | FPGA | Very large scale integration | Dissolved gas analysis | fault attack | Circuit faults | Indium phosphide | Vehicles | SRAM-based | configuration errors | Cryptography | Protection | Field programmable gate arrays
Conference Proceeding
2008 14th IEEE International On-Line Testing Symposium, ISSN 1942-9398, 07/2008, pp. 289 - 294
Due to their reconfigurability and their high density of resources, SRAM-based FPGAs are more and more used in embedded systems. For some applications... 
Error analysis | Space technology | Laboratories | Information security | Circuit faults | Application software | Protection | Field programmable gate arrays | Indium phosphide | Testing
Conference Proceeding
11th IEEE International On-Line Testing Symposium, ISSN 1942-9398, 2005, Volume 2005, pp. 122 - 125
This paper introduces the security evaluations process and focus on the tests done on hardware products, specifically smartcards. Some examples, issued from... 
Performance evaluation | Laboratories | ISO standards | Life testing | Banking | Hardware | Accreditation | National security | Certification | Embedded software
Conference Proceeding
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 06/2011, pp. 24 - 27
Today TRNGs are used in many different applications. The quality of their randomness is determined by these applications: for example those with security... 
Resistors | Temperature distribution | Noise | Heating | Thermal noise | Nitrogen | Oscillators
Conference Proceeding
2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07, ISSN 1520-6149, 04/2007, Volume 2, pp. II-257 - II-260
Conference Proceeding
ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors, ISSN 1063-6862, 07/2010, pp. 115 - 122
Laser-based fault injections are currently the most efficient technique that can be used to attack a secure system, since they have very high timing and... 
Decision support systems | DDR | SRAM-based FPGA | Virtual reality | Fiber reinforced plastics | laser fault injections | Quadratic programming | Field programmable gate arrays | AES | Laser fault injections
Conference Proceeding
2008 Design, Automation and Test in Europe, ISSN 1530-1591, 03/2008, pp. 1274 - 1279
In the field of the side channel analysis, hardware distortions such as glitches and random frequency are classical countermeasures. A glitch influences the... 
Energy consumption | Smart cards | Circuits | Electromagnetic radiation | Frequency | Educational institutions | Hardware | Cryptography | Autocorrelation | Clocks
Conference Proceeding
JOURNAL DE PHYSIQUE IV, ISSN 1155-4339, 06/1998, Volume 8, Issue P2, pp. 659 - 662
The Pry and Bean model of losses in a conducting sheet of magnetic material is extended to asymetric minor loops. An analytical expression is derived for the... 
PHYSICS, MULTIDISCIPLINARY
Journal Article
2010 15th IEEE European Test Symposium, ISSN 1530-1877, 05/2010, pp. 251 - 251
In this work, we have analyzed fault injections during an AES encryption implemented onto a Xilinx Virtex FPGA. The crypto-processor used had been secured... 
Cryptography | Robustness | Field programmable gate arrays
Conference Proceeding
2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 05/2014, pp. 130 - 135
Power supply underpowering and negative power supply glitches are commonly used for the purpose of injecting faults into secure circuits. The related fault... 
Clocks
Conference Proceeding
Journal De Physique. IV : JP, ISSN 1155-4339, 06/1998, Volume 8, Issue 2, pp. Pr2 - Pr2
Conference Proceeding
Proceedings of the Second Workshop on cryptography and security in computing systems, 01/2015, Volume 2015-, pp. 25 - 30
In this paper we study the information leakage that may exist, due to electrical coupling, between logically independent blocks of a secure circuit as a new... 
Delay-based countermeasure | side effects | information leakage | 'DPA-like' analysis | Information leakage | Side effects
Conference Proceeding
2013 IEEE 19th International On-Line Testing Symposium (IOLTS), ISSN 1942-9398, 07/2013, pp. 110 - 115
Secure circuits are prone to a wide range of physical attacks. Among those are fault attacks based on modifying the circuit environment in order to change its... 
Power supplies | Generators | Timing | Encryption | Registers | Circuit faults | Clocks
Conference Proceeding
BULLETIN DE LA SOCIETE DE CHIMIE BIOLOGIQUE, ISSN 0037-9042, 1957, Volume 39, Issue 11, pp. 1343 - 1350
Journal Article
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), ISSN 1530-1591, 03/2014, pp. 1 - 6
The use of electromagnetic glitches has recently emerged as an effective fault injection technique for the purpose of conducting physical attacks against... 
Power supplies | Delays | Circuit faults | Probes | Detectors | Clocks
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.