default search action
AsianHOST 2021: Shanghai, China
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2021, Shanghai, China, December 16-18, 2021. IEEE 2021, ISBN 978-1-6654-4185-8
- Xiangjun Lu, Chi Zhang, Dawu Gu:
Attention - Based Non-Profiled Side-Channel Attack. 1-6 - Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino:
Deep Learning Side-Channel Attacks Against Lightweight SCA Countermeasure RSM-AES. 1-6 - Jinxin Dong, Pingqiang Zhou:
Detecting Adversarial Examples Utilizing Pixel Value Diversity. 1-6 - Markku-Juhani O. Saarinen:
On Entropy and Bit Patterns of Ring Oscillator Jitter. 1-6 - Timothy Dunlap, Omid Aramoon, Gang Qu, Tian Wang, Xiaoxin Cui, Dunshan Yu:
A Novel Circuit Authentication Scheme Based on Partial Polymorphic Gates. 1-4 - Sandhya Koteshwara:
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis. 1-4 - Chi Zhang, Xiangjun Lu, Dawu Gu:
Binary Classification-Based Side-Channel Analysis. 1-6 - Yuqian Sun, Xiaole Cui, Yongliang Chen, Xiaoxin Cui:
The logic obfuscation of LFSR with the crosstalk based polymorphic gate. 1-6 - Weihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi:
Pipelined High-Throughput NTT Architecture for Lattice-Based Cryptography. 1-4 - Qiang Fang, Massimo Alioto:
Last-Round and Joint First/Last-Round Power Analysis Attacks on PRESENT. 1-6 - Kshitij Raj, Arrush Hegde, Atul Prasad Deb Nath, Swarup Bhunia, Sandip Ray:
SSEL: An Extensible Specification Language for SoC Security. 1-6 - Jizhong Yang, Ying Zhang, Yifeng Hua, Jiaqi Yao, Zhiming Mao, Xin Chen:
Hardware Trojans Detection Through RTL Features Extraction and Machine Learning. 1-4 - Xuyang Huang, Ming Ming Wong, Anh Tuan Do, Wang Ling Goh:
A Backpropagation Extreme Learning Machine Approach to Fast Training Neural Network-Based Side-Channel Attack. 1-6 - Hirak Mondal, Urbi Chatterjee:
Revisiting UAV Authentication Schemes: Practical Attacks on Aviation Infrastructure. 1-6 - Jonathon Durand, Anisul Abedin, Jakub Szefer:
Ultra Freezing Attacks and Clock Glitching of Clock Oscillator Circuits. 1-6 - Chandan Kumar Chaudhary, Urbi Chatterjee, Debdeep Mukhopadhyay:
Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain. 1-4 - Rei Kudo, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li:
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm. 1-6 - Zain Ul Abideen, Tiago Diadami Perez, Samuel Pagliarini:
From FPGAs to Obfuscated eASICs: Design and Security Trade-offs. 1-4 - Lijuan Han, Yuan Cao, Lei Qian, Haodong Xie, Chip-Hong Chang:
An Ultra-Low Power 3-T Chaotic Map based True Random Number Generator. 1-6 - Xingxin Wang, Jian Zheng, Lingjuan Wu, Jiacheng Zhu, Wei Hu:
A Correlation Fault Attack on Rotating S-Box Masking AES. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.