Stealthy dopant-level hardware Trojans: extended version. Becker, G. T., Regazzoni, F., Paar, C., & Burleson, W. P. J. Cryptogr. Eng., 4(1):19–31, 2014. Paper doi bibtex @article{DBLP:journals/jce/BeckerRPB14,
author = {Georg T. Becker and
Francesco Regazzoni and
Christof Paar and
Wayne P. Burleson},
title = {Stealthy dopant-level hardware Trojans: extended version},
journal = {J. Cryptogr. Eng.},
volume = {4},
number = {1},
pages = {19--31},
year = {2014},
url = {https://doi.org/10.1007/s13389-013-0068-0},
doi = {10.1007/s13389-013-0068-0},
timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"b9LMATcnxzLBbH79b","bibbaseid":"becker-regazzoni-paar-burleson-stealthydopantlevelhardwaretrojansextendedversion-2014","author_short":["Becker, G. T.","Regazzoni, F.","Paar, C.","Burleson, W. P."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Georg","T."],"propositions":[],"lastnames":["Becker"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["Christof"],"propositions":[],"lastnames":["Paar"],"suffixes":[]},{"firstnames":["Wayne","P."],"propositions":[],"lastnames":["Burleson"],"suffixes":[]}],"title":"Stealthy dopant-level hardware Trojans: extended version","journal":"J. Cryptogr. Eng.","volume":"4","number":"1","pages":"19–31","year":"2014","url":"https://doi.org/10.1007/s13389-013-0068-0","doi":"10.1007/s13389-013-0068-0","timestamp":"Thu, 09 Jul 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/jce/BeckerRPB14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jce/BeckerRPB14,\n author = {Georg T. Becker and\n Francesco Regazzoni and\n Christof Paar and\n Wayne P. Burleson},\n title = {Stealthy dopant-level hardware Trojans: extended version},\n journal = {J. Cryptogr. Eng.},\n volume = {4},\n number = {1},\n pages = {19--31},\n year = {2014},\n url = {https://doi.org/10.1007/s13389-013-0068-0},\n doi = {10.1007/s13389-013-0068-0},\n timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Becker, G. T.","Regazzoni, F.","Paar, C.","Burleson, W. P."],"key":"DBLP:journals/jce/BeckerRPB14","id":"DBLP:journals/jce/BeckerRPB14","bibbaseid":"becker-regazzoni-paar-burleson-stealthydopantlevelhardwaretrojansextendedversion-2014","role":"author","urls":{"Paper":"https://doi.org/10.1007/s13389-013-0068-0"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["stealthy","dopant","level","hardware","trojans","extended","version","becker","regazzoni","paar","burleson"],"title":"Stealthy dopant-level hardware Trojans: extended version","year":2014}