2013
DOI: 10.1080/19393555.2014.891276
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Hardware Security by Hamming-Ball Based State Assignment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(39 citation statements)
references
References 8 publications
0
39
0
Order By: Relevance
“…The worst error masking probability is used to characterize the code, in practice the (true) error masking probability of the code Q * can be significantly smaller. Methods for avoiding this worst case scenario were presented in [12], [13].…”
Section: Hardware Security Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…The worst error masking probability is used to characterize the code, in practice the (true) error masking probability of the code Q * can be significantly smaller. Methods for avoiding this worst case scenario were presented in [12], [13].…”
Section: Hardware Security Problemmentioning
confidence: 99%
“…Robust codes with or without pre-mapping [9], [12], [13] are considered as a countermeasure against weak attacks, and Algebraic Manipulation Detection (AMD) codes [7] are considered to be a countermeasure against strong attacks.…”
Section: Role Of Entropy In Code Designmentioning
confidence: 99%
See 1 more Smart Citation
“…In cases where the entropy of the code is not maximal, the error detection of a code may degrade or even vanish [18], [20], [24]. Several techniques that can ensure that any attack is detected with non-zero probability were presented in [20], [19], [21]. These techniques are based on pre-mapping.…”
Section: Codes For Non Uniformly Distributed Datamentioning
confidence: 99%
“…Error e 2 is masked with high probability since {e 2 + V } ⊆ C. Error e 3 is detected with variable probability, depending on the cumulative probability of the codewords in C ∩ {e 3 + V }. The pre-mapping techniques presented in [19], [20] aim to eliminate errors of type e 2 that are masked with a high probability.…”
Section: Codes For Non Uniformly Distributed Datamentioning
confidence: 99%