Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Physical unclonable functions for device authentication and secret key generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
Statistical timing analysis: From basic principles to state of the art
Static-timing analysis (STA) has been one of the most pervasive and successful analysis
engines in the design of digital circuits for the last 20 years. However, in recent years, the …
engines in the design of digital circuits for the last 20 years. However, in recent years, the …
Statistical static timing analysis: A survey
C Forzan, D Pandini - Integration, 2009 - Elsevier
As the device and interconnect physical dimensions decrease steadily in modern nanometer
silicon technologies, the ability to control the process and environmental variations is …
silicon technologies, the ability to control the process and environmental variations is …
Understanding the effect of process variations on the delay of static and domino logic
In this paper, the effect of process variations on delay is analyzed in depth for both static and
dynamic CMOS logic styles. Analysis allows for gaining an insight into the delay …
dynamic CMOS logic styles. Analysis allows for gaining an insight into the delay …
Clock around the clock: Time-based device fingerprinting
Physical device fingerprinting exploits hardware features to uniquely identify a machine.
This technique has been used for authentication, license binding, or attackers identification …
This technique has been used for authentication, license binding, or attackers identification …
Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints
We demonstrate that unmodified commercial Flash memory can provide two important
security functions: true random number generation and digital fingerprinting. Taking …
security functions: true random number generation and digital fingerprinting. Taking …
Lessons learned: Analysis of PUF-based authentication protocols for IoT
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …
where entities prove their identities to each other and generally establish and derive …
Power, thermal, and reliability modeling in nanometer-scale microprocessors
System integration and performance requirements are dramatically increasing the power
consumptions and power densities of high-performance microprocessors. High power …
consumptions and power densities of high-performance microprocessors. High power …
AEGIS: A single-chip secure processor
This article presents the AEGIS secure processor architecture, which enables new
applications by ensuring private and authentic program execution even in the face of …
applications by ensuring private and authentic program execution even in the face of …
Leakage power analysis attacks: A novel class of attacks to nanometer cryptographic circuits
In this paper, a novel class of power analysis attacks to cryptographic circuits is presented.
These attacks aim at recovering the secret key of a cryptographic core from measurements …
These attacks aim at recovering the secret key of a cryptographic core from measurements …