Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Reversing stealthy dopant-level circuits

From MaRDI portal
Publication:5265076
Jump to:navigation, search

DOI10.1007/978-3-662-44709-3_7zbMATH Open1383.94044OpenAlexW2065181350MaRDI QIDQ5265076FDOQ5265076


Authors: Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino Edit this on Wikidata


Publication date: 21 July 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44709-3_7




Recommendations

  • The first thorough side-channel hardware Trojan
  • A stealthy hardware Trojan based on a statistical fault attack
  • scientific article; zbMATH DE number 1979271
  • Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013
  • Private Circuits II: Keeping Secrets in Tamperable Circuits


zbMATH Keywords

Chip reverse engineeringLSI failure analysisPassive voltage contrastStealthy dopant-level trojan


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (2)

  • Differential Fault Attack on Grain v1, ACORN v3 and Lizard
  • A note on detecting sneak paths in transistor networks





This page was built for publication: Reversing stealthy dopant-level circuits

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5265076)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:5265076&oldid=19904936"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 8 February 2024, at 20:24. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki