Advertisement

High-efficient generation algorithm for large random active shield

  • Ruishan Xin
  • Yidong Yuan
  • Jiaji He
  • Yuehui Li
  • Yiqiang ZhaoEmail author
Letter
  • 4 Downloads

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61376032) and Tianjin Science and Technology Project of China (Grant No. 15ZCZDGX00180).

References

  1. 1.
    Shen C X, Zhang H G, Feng D G, et al. Survey of information security. Sci China Ser F-Inf Sci, 2007, 50: 273–298CrossRefzbMATHGoogle Scholar
  2. 2.
    Tria A, Choukri H. Invasive attacks. In: Encyclopedia of Cryptography & Security. Boston: Springer, 2011. 623–629Google Scholar
  3. 3.
    Xuan T N, Danger J L, Guilley S, et al. Cryptographically secure shield for security IPs protection. IEEE Trans Comput, 2017, 66: 354–360MathSciNetzbMATHGoogle Scholar
  4. 4.
    Briais S, Cioranesco J M, Danger J L, et al. Random active shield. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography, Piscataway, 2012. 103–113Google Scholar
  5. 5.
    Briais S, Caron S, Cioranesco J M, et al. 3D hardware canaries. In: Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2012. 1–22Google Scholar
  6. 6.
    Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to Algorithms. 3rd ed. Cambridge: MIT Press, 2009. 65–97, 359–397zbMATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  • Ruishan Xin
    • 1
    • 2
  • Yidong Yuan
    • 1
    • 2
  • Jiaji He
    • 1
    • 2
  • Yuehui Li
    • 1
    • 2
  • Yiqiang Zhao
    • 1
    • 2
    Email author
  1. 1.School of MicroelectronicsTianjin UniversityTianjinChina
  2. 2.Tianjin Key Laboratory of Imaging and Sensing Microelectronic TechnologyTianjin UniversityTianjinChina

Personalised recommendations