Author of the publication

Overview of hardware trojan detection and prevention methods

, and . 2015 European Conference on Circuit Theory and Design (ECCTD 2015), page 1-4. Piscataway, NJ, IEEE, (2015)
DOI: 10.1109/ECCTD.2015.7300077

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-level implementation and side-channel detection of stealthy hardware trojans on field programmable gate arrays., and . IET Computers & Digital Techniques, 8 (6): 246-255 (2014)Overview of hardware trojan detection and prevention methods, and . 2015 European Conference on Circuit Theory and Design (ECCTD 2015), page 1-4. Piscataway, NJ, IEEE, (2015)Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule., , and . IACR Cryptology ePrint Archive, (2015)Error Detection for Borrow-Save Adders Dedicated to ECC Unit., , , , and . FDTC, page 77-86. IEEE Computer Society, (2008)Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput., , , and . IEEE Trans. Computers, 65 (7): 2074-2089 (2016)Detection of cryptographic algorithms with grap., , and . IACR Cryptology ePrint Archive, (2017)Introduction to hardware trojan detection methods, and . 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE 2015), page 770-775. Piscataway, NJ, IEEE, (2015)Integrated Evaluation Platform for Secured Devices., , , , , , , and . ReCoSoC, page 214-219. Univ. Montpellier II, (2006)Conception et sécurisation d'unités arithmétiques hautes performances pour courbes elliptiques. (Design and Securization of High-Performance Arithmetic Units for ECC).. Montpellier 2 University, France, (2009)Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results., and . ReConFig, page 304-309. IEEE Computer Society, (2010)