publié le: 2021
Physical Unclonable Functions (PUFs) exploit the manufacturing process variations inherent in silicon-based chips to generate unique secret keys. Alth...
Post-quantum cryptographic algorithms have emerged to secure communication channels between electronic devices faced with the advent of quantum comput...
Optical probing, though developed as silicon debugging tools from the chip backside, has shown its capability of extracting secret data, such as crypt...
Ring Oscillator Physical Unclonable Functions (RO-PUFs) exploit the inherent manufacturing process variations, such as systematic and stochastic varia...
Covert Hardware Trojan Horses (HTH) introduced by malicious attackers during the fabless manufacturing process of integrated circuits (IC) have the po...