Author of the publication

Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.

, , , , and . J. Signal Process. Syst., 87 (3): 371-381 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keyed logic BIST for Trojan detection in SoC., , , and . ISSoC, page 1-4. IEEE, (2014)A Digital Signature Scheme Based on Random Error-Correcting Codes., , and . IMACC, volume 1355 of Lecture Notes in Computer Science, page 161-167. Springer, (1997)On A²-Codes Including Arbiter's Attacks., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 456-460. Springer, (1994)Multialphabet coding with separate alphabet description., , and . SEQUENCES, page 56-65. IEEE, (1997)Authentication., and . Encyclopedia of Cryptography and Security, Springer, (2005)On the Use of the Binary Multiplying Channel in a Private Communication System.. EUROCRYPT, volume 209 of Lecture Notes in Computer Science, page 339-348. Springer, (1984)On the construction of cartesian authentication codes over symplectic spaces., , and . IEEE Trans. Inf. Theory, 40 (3): 920-929 (1994)Unconditionally Secure Group Authentication., , and . Des. Codes Cryptogr., 14 (3): 281-296 (1998)A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 181-195. Springer, (2000)Weighting of Double Exponential Distributed Data in Lossless Image Compression., and . Data Compression Conference, page 543. IEEE Computer Society, (1998)