• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse.

Krishna BagadiaUrbi ChatterjeeDebapriya Basu RoyDebdeep MukhopadhyayRajat Subhra Chakraborty
Published in: HOST (2017)
Keyphrases