Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Zhicun Luan"'
Publikováno v:
IET Circuits, Devices and Systems, Vol 16, Iss 1, Pp 40-52 (2022)
Abstract Internet of Things (IoT) devices are vulnerable to many physical attacks, including reverse engineering and side‐channel analysis because the sensitive information of circuits may be leaked through the physical characteristics of the devic
Externí odkaz:
https://doaj.org/article/9b912e78000f401086b61bdc0df69798
Publikováno v:
IET Circuits, Devices and Systems, Vol 16, Iss 1, Pp 40-52 (2022)
Zhang, Y, Wu, Q, Wang, P, Wen, L, Luan, Z & Gu, C 2021, ' TVD-PB Logic Circuit Based on Camouflaging Circuit for IoT Security ', IET Circuits, Devices and Systems . https://doi.org/10.1049/cds2.12080
Zhang, Y, Wu, Q, Wang, P, Wen, L, Luan, Z & Gu, C 2021, ' TVD-PB Logic Circuit Based on Camouflaging Circuit for IoT Security ', IET Circuits, Devices and Systems . https://doi.org/10.1049/cds2.12080
Internet of Things (IoT) devices are vulnerable to many physical attacks, including reverse engineering and side‐channel analysis because the sensitive information of circuits may be leaked through the physical characteristics of the device. A logi
Publikováno v:
Journal of Electronic Materials. 48:7603-7607
Secure data encryption depends on the one-way functions and copy protection relies on features that are hard to reproduce. Herein, we present the physically unclonable function (PUF) concept based on PbS quantum dots (QDS) for ultra high-density key
Autor:
Pengjun Wang, Qiaoyan Yu, Jiawei Wang, Xiaoyong Xue, Zhicun Luan, Xiaoyang Zeng, Yuejun Zhang
Publikováno v:
AsianHOST
The globalization of supply chain makes semiconductor chips susceptible to various security threats. Design obfuscation techniques have been widely investigated to thwart intellectual property (IP) piracy attacks. Key distribution among IP providers,
Publikováno v:
2019 China Semiconductor Technology International Conference (CSTIC).
In the RISC-V architecture, it is very important to extend instruction sets for achieving functions of product requirement. Usually, RISC-V research adopts simple look-up table decoding, which is difficult to protect the extended instruction set effe
Publikováno v:
Canadian Journal of Electrical and Computer Engineering; 2020, Vol. 43 Issue: 2 p73-82, 10p
Publikováno v:
IET Circuits, Devices & Systems (Wiley-Blackwell); Jan2022, Vol. 16 Issue 1, p40-52, 13p
Publikováno v:
Journal of Electronic Materials; Dec2019, Vol. 48 Issue 12, p7603-7607, 5p