Login / Signup

Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis.

Xuan Thuy NgoZakaria NajmShivam BhasinSylvain GuilleyJean-Luc Danger
Published in: J. Cryptogr. Eng. (2016)
Keyphrases