1 |
GOMEZ H, DURAN C, ROA E. Standard cell camouflage method to counter silicon reverse engineering[C]// 2018 IEEE International Conference on Consumer Electronics. Las Vegas: IEEE, 2018: 1-4. DOI:10.1109/ICCE.2018.8326300
doi: 10.1109/ICCE.2018.8326300
|
2 |
ALASAD Q, YUAN J. Logic obfuscation against IC reverse engineering attacks using PLGs[C]// 2017 IEEE International Conference on Computer Design (ICCD). Boston: IEEE, 2017: 341-344. DOI:10.1109/ICCD.2017.59
doi: 10.1109/ICCD.2017.59
|
3 |
EROZAN A T, HEFENBROCK M, BEIGL M, et al. Reverse engineering of printed electronics circuits: From imaging to netlist extraction[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 475-486. DOI:10.1109/TIFS. 2019.2922237
doi: 10.1109/TIFS. 2019.2922237
|
4 |
JEYAVIJAYAN R, OZGUR S, RAMESH K. VLSI testing based security metric for IC camouflaging[C]// IEEE International Test Conference (ITC). Anaheim: IEEE, 2013: 1-4. DOI:10.1109/TEST.2013.6651879
doi: 10.1109/TEST.2013.6651879
|
5 |
李立威. 防御逆向攻击的逻辑混淆电路设计[D]. 宁波: 宁波大学, 2019. doi:10.15407/mag15.03.369 LI L W. Design of Logic Obfuscation Circuit for Defending Reverse Attack[D]. Ningbo: Ningbo University, 2019. doi:10.15407/mag15.03.369
doi: 10.15407/mag15.03.369
|
6 |
ERBAGCI B, ERBAGCI C, AKKAYA N E C, et al. A secure camouflaged threshold voltage defined logic family[C]// IEEE International Symposium on Hardware Oriented Security and Trust (HOST). McLean: IEEE, 2016: 229-235. DOI:10. 1109/HST.2016.7495587
doi: 10. 1109/HST.2016.7495587
|
7 |
JANG J W, DE A, VONTELA D, et al. Threshold-defined logic and interconnect for protection against reverse engineering[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 39(2): 308-320. DOI:10.1109/TCAD.2018.2887056
doi: 10.1109/TCAD.2018.2887056
|
8 |
UTYAMISHEV D, PARTIN-VAISBAND I. Real-time detection of power analysis attacks by machine learning of power supply variations on-chip[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 39(1): 45-55. doi:10.1109/TCAD.2018.2883971
doi: 10.1109/TCAD.2018.2883971
|
9 |
SENGUPTA A, MAZUMDAR B, YASIN M, et al. Logic locking with provable security against power analysis attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019, 39(4): 766-778. doi:10.1109/tcad.2019.2897699
doi: 10.1109/tcad.2019.2897699
|
10 |
KUMAR S D, THAPLIYAL H. Exploration of non-volatile MTJ/CMOS circuits for DPA-resistant embedded hardware[J]. IEEE Transactions on Magnetics, 2019, 55(12): 1-8. DOI:10.1109/TMAG.2019.2943053
doi: 10.1109/TMAG.2019.2943053
|
11 |
孙曦. 基于和图及分解算法的电流型CMOS电路设计[D]. 杭州: 杭州师范大学, 2020. SUN X. Design of Current Mode CMOS Circuit based on HE Map and Function Decomposition Algorithm[D]. Hangzhou: Hangzhou Normal University, 2020.
|
12 |
姚茂群, 孙曦, 周旋. 基于电流型CMOS电路的新型数据选择器[J]. 杭州师范大学学报(自然科学版), 2020, 19(1): 98-104. DOI:10.12191/j.issn.1674-232X.2020.01.016 YAO M Q, SUN X, ZHOU X. New data selector based on current-mode CMOS circuit[J]. Journal of Hangzhou Normal University (Natural Science Edition), 2020, 19(1): 98-104. DOI:10.12191/j.issn.1674-232X.2020.01.016
doi: 10.12191/j.issn.1674-232X.2020.01.016
|
13 |
RAJENDRAN J, SAM M, SINANOGLU O, et al. Security analysis of integrated circuit camouflaging[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. Berlin: ACM, 2013: 709-720. doi:10.1145/2508859.2516656
doi: 10.1145/2508859.2516656
|
14 |
ZABIB D Z, LEVI I, FISH A, et al. Secured dual-rail-precharge mux-based (DPMUX) symmetric-logic for low voltage applications[C]// 2017 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S). Burlingame: IEEE, 2017: 1-2. DOI:10.1109/S3S.2017.8309254
doi: 10.1109/S3S.2017.8309254
|
15 |
刘泽艺, 高能, 屠晨阳, 等. 一种抗能量分析攻击的复合寄存器系统[J]. 密码学报, 2014, 1(5): 411-421. DOI:10.13868/j.cnki.jcr.000039 LIU Z Y, GAO N, TU C Y, et al. A compound register system against power analysis attack[J]. Journal of Cryptologic Research, 2014, 1(5): 411-421. DOI:10.13868/j.cnki.jcr.000039
doi: 10.13868/j.cnki.jcr.000039
|
16 |
SARAVANAN P, KALPANA P. An energy efficient XOR gate implementation resistant to power analysis attacks[J]. Journal of Engineering Science and Technology, 2015, 10(10): 1275-1292.
|
17 |
王晨旭. 密码芯片抗功耗攻击技术研究[D]. 哈尔滨: 哈尔滨工业大学, 2013. WANG C X. Research on the Power Analysis Resistant Technology of Cryptographic IC[D]. Harbin: Harbin Institute of Technology, 2013.
|
18 |
BHARATH L N, KUMAR G. A novel countermeasure for power attacks[C]// 2013 Students Conference on Engineering and Systems (SCES). Allahabad: IEEE, 2013: 1-4. DOI:10. 1109/SCES.2013.6547580
doi: 10. 1109/SCES.2013.6547580
|
19 |
蔡里昂. 抗DPA攻击功耗平坦化标准单元设计[D]. 天津: 天津大学, 2019. CAI L A. Design of DPA-Resistant Power-Flattening Standard Cells[D]. Tianjin: Tianjin University, 2019.
|