Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
Crossref DOI link: https://doi.org/10.1007/s13389-016-0129-2
Published Online: 2016-04-07
Published Print: 2016-09
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Ngo, Xuan Thuy
Najm, Zakaria
Bhasin, Shivam
Guilley, Sylvain
Danger, Jean-Luc
Text and Data Mining valid from 2016-04-07