z-logo
open-access-imgOpen Access
Method Taking into Account Process Dispersions to Detect Hardware Trojan Horse by Side-Channel
Author(s) -
Xuan Thuy Ngo,
Zakaria Najm,
Shivam Bhasin,
Sylvain Guilley,
JeanLuc Danger
Publication year - 2014
Publication title -
hal (le centre pour la communication scientifique directe)
Language(s) - English
Resource type - Conference proceedings
Subject(s) - trojan horse , side channel attack , process (computing) , computer science , channel (broadcasting) , computer hardware , embedded system , computer security , operating system , computer network , cryptography

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here