Condescending 发表于 2025-3-26 22:34:32
http://reply.papertrans.cn/25/2406/240555/240555_31.pngOutmoded 发表于 2025-3-27 01:40:41
http://reply.papertrans.cn/25/2406/240555/240555_32.pngbacteria 发表于 2025-3-27 06:41:05
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detectional correlation across regions in terms of process variations. To amplify the Trojan effect on supply current, we propose a region-based vector generation approach, which divides a circuit-under-test (CUT) into several regions and for each region, finds the test vectors which induce maximum activity弓箭 发表于 2025-3-27 10:37:27
http://reply.papertrans.cn/25/2406/240555/240555_34.png世俗 发表于 2025-3-27 16:16:42
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectureswe use these generic estimates and Cell-/GPU-specific optimization techniques to give more precise figures for our target platforms, and finally, we present implementation results of all 10 non-AES based SHA-3 candidates.流出 发表于 2025-3-27 20:09:49
http://reply.papertrans.cn/25/2406/240555/240555_36.png蜈蚣 发表于 2025-3-27 22:45:46
http://reply.papertrans.cn/25/2406/240555/240555_37.pngcommensurate 发表于 2025-3-28 03:00:06
Sponge-Based Pseudo-Random Number Generatorsembedded security devices as it requires few resources. We propose a model for such generators and explain how to define one on top of a sponge function. The construction is a novel way to use a sponge function, and inputs and outputs blocks in a continuous fashion, allowing to interleave the feed opatriarch 发表于 2025-3-28 07:40:56
http://reply.papertrans.cn/25/2406/240555/240555_39.pngmediocrity 发表于 2025-3-28 14:10:59
http://reply.papertrans.cn/25/2406/240555/240555_40.png