Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits. However, the HT issue remains largely unexplored in the...
Guardado en:
Autores principales: | Liakot Ali, Farshad |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Public Library of Science (PLoS)
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/ac72aefde03941e99555da282eb25b5f |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Area efficient camouflaging technique for securing IC reverse engineering.
por: Md Liakot Ali, et al.
Publicado: (2021) -
Area efficient camouflaging technique for securing IC reverse engineering
por: Md. Liakot Ali, et al.
Publicado: (2021) -
Invisible Trojan-horse attack
por: Shihan Sajeed, et al.
Publicado: (2017) -
Machine learning for DCO-OFDM based LiFi.
por: Krishna Saha Purnita, et al.
Publicado: (2021) -
HIV and mature dendritic cells: Trojan exosomes riding the Trojan horse?
por: Nuria Izquierdo-Useros, et al.
Publicado: (2010)