-
1
Hardware assurance with silicon photonic physical unclonable functions
Published 2024-10-01Subjects: Get full text
Article -
2
Weak Physycally Unclonable Functions in CMOS Technology: A Review
Published 2024-12-01Subjects: Get full text
Article -
3
-
4
Trusted execution environments for quantum computers
Published 2025-06-01Subjects: Get full text
Article -
5
Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM
Published 2024-01-01Subjects: Get full text
Article -
6
A Case Study of 3rd Party Hardware: The Weakest Link in Google’s Trustworthy Artificial Intelligence Implementation
Published 2025-01-01Subjects: Get full text
Article -
7
Using Embedded Temperature Sensors to Detect Package Tampering
Published 2025-07-01Subjects: Get full text
Article -
8
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01Subjects: “…hardware security…”
Get full text
Article -
9
Secure multidimensional interconnection network for the software defined system on wafer
Published 2025-04-01Subjects: Get full text
Article -
10
Boosting Stochasticity in Ovonic Threshold Switches Through Cryogenic First Firing for Fast and Reliable Entropy Generation
Published 2025-06-01Subjects: Get full text
Article -
11
ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification
Published 2025-08-01Subjects: “…hardware security…”
Get full text
Article -
12
A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence
Published 2025-08-01Subjects: “…hardware security…”
Get full text
Article -
13
In-Depth Review and Comparative Analysis of DRAM-Based PUFs
Published 2025-01-01Subjects: “…Hardware security…”
Get full text
Article -
14
A Novel Architecture of Masked Logic Cells for Side-Channel Attacks
Published 2024-02-01Subjects: Get full text
Article -
15
Time-Domain ADC and Security Co-Design for SiP-Based Wireless SAW Sensor Readers
Published 2025-07-01Subjects: Get full text
Article -
16
Clock Glitch Fault Attacks on Deep Neural Networks and Their Countermeasures
Published 2025-04-01Subjects: Get full text
Article -
17
Improving Physically Unclonable Functions’ Performance Using Second-Order Compensated Measurement
Published 2025-02-01Subjects: Get full text
Article -
18
A Study of the Optimal Logic Combinations of RO-Based PUFs on FPGAs to Maximize Identifiability
Published 2024-12-01Subjects: Get full text
Article -
19
Implementing Multimodal Hardware Security with 2D α‐In2Se3 Ferroelectric Transistor
Published 2025-07-01Subjects: Get full text
Article -
20
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
Published 2025-01-01Subjects: “…Hardware security…”
Get full text
Article