Abstract: Cryptographic ICs have been widely applied to numerous security-critical environments nowadays. Fault injection has become a serious attack on cryptographic IC, especially soft-errors or ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results