2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) 2014
DOI: 10.1109/dft.2014.6962084
|View full text |Cite
|
Sign up to set email alerts
|

Protecting cryptographic hardware against malicious attacks by nonlinear robust codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
16
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…A subset of r bits in the LFSR of a given design (e.g. 35 16 ), determined during design time, is used to encode the error signals for the CED checker. This subset can be chosen arbitrarily since the characteristic polynomial and seed of the LFSR are programmable.…”
Section: E Error Signal Encodingmentioning
confidence: 99%
See 4 more Smart Citations
“…A subset of r bits in the LFSR of a given design (e.g. 35 16 ), determined during design time, is used to encode the error signals for the CED checker. This subset can be chosen arbitrarily since the characteristic polynomial and seed of the LFSR are programmable.…”
Section: E Error Signal Encodingmentioning
confidence: 99%
“…If the error signal takes any other value (e.g. 36 16 ), an attack is detected. The subset of r bits can be different for different chip designs.…”
Section: E Error Signal Encodingmentioning
confidence: 99%
See 3 more Smart Citations