Stealthy dopant-level hardware Trojans: extended version. Becker, G. T., Regazzoni, F., Paar, C., & Burleson, W. P. J. Cryptogr. Eng., 4(1):19–31, 2014.
Stealthy dopant-level hardware Trojans: extended version [link]Paper  doi  bibtex   
@article{DBLP:journals/jce/BeckerRPB14,
  author    = {Georg T. Becker and
               Francesco Regazzoni and
               Christof Paar and
               Wayne P. Burleson},
  title     = {Stealthy dopant-level hardware Trojans: extended version},
  journal   = {J. Cryptogr. Eng.},
  volume    = {4},
  number    = {1},
  pages     = {19--31},
  year      = {2014},
  url       = {https://doi.org/10.1007/s13389-013-0068-0},
  doi       = {10.1007/s13389-013-0068-0},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0