Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
fault-injection attack (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/130)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Early RTL analysis for SCA vulnerability in fuzzy extractors of memory-based PUF enabled devices
Lai, Xinhui
;
Jenihhin, Maksim
;
Selims, Georgios
arXiv.org
2020
/
6 p. : ill
https://doi.org/10.48550/arXiv.2008.08409
https://arxiv.org/abs/2008.08409
journal article
Related publications
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
Number of records 1, displaying
1 - 1
keyword
130
1.
fault-injection attack
2.
false data injection attack
3.
ghost injection attack
4.
fault injection
5.
Fault Injection Simulation
6.
fiber-reinforced composites and injection molding
7.
Gate Injection Transistor (GIT)
8.
gating-aware error injection
9.
injection molding
10.
injection of technical water
11.
manual hydrodynamic injection
12.
power injection
13.
reactive power injection
14.
zero injection phase
15.
attack detection
16.
attack graphs
17.
attack model
18.
attack sophistication
19.
attack trees
20.
attack vectors
21.
attack visualisation
22.
botnet attack
23.
corrosive attack
24.
cyber-attack
25.
cyber-attack pathways
26.
Denial of Service (DoS) attack
27.
discovery of attack scenarios
28.
DoS attack
29.
highly targeted attack
30.
iming side-channel attack
31.
Low-and-Slow DoS attack
32.
manufacturing-time attack
33.
oracle-less attack
34.
quantum attack
35.
ransomware attack
36.
removal attack
37.
Return of the Coppersmith’s Attack (ROCA)
38.
return of the Coppersmith’s attack vulnerability
39.
SAT attack
40.
SAT-based attack
41.
side-channel attack
42.
asynchronous fault detection
43.
automatic fault diagnosis
44.
bearing fault diagnosis
45.
bi-directional fault monitoring devices
46.
conditional fault collapsing
47.
control fault models
48.
critical path fault tracing
49.
cross-layer fault tolerance
50.
cross-layered fault management
51.
extended fault class
52.
fault currents
53.
fault analysis
54.
fault analysis model
55.
fault classification
56.
fault classification
57.
fault collapsing
58.
fault compensation
59.
fault coverage
60.
fault current and voltage measurements
61.
Fault current limite
62.
fault current limiter
63.
fault detection
64.
fault detection and diagnoses
65.
fault detection and diagnosis
66.
fault diagnosis
67.
fault diagnostic
68.
fault diagnostic resolution
69.
fault diagnostics
70.
fault dignosis
71.
fault effects
72.
fault emulation
73.
fault equivalence and dominance
74.
fault handling
75.
fault handling strategy
76.
fault indicator
77.
fault Interruption
78.
fault localization
79.
fault location
80.
fault management
81.
fault masking
82.
fault modeling
83.
fault models
84.
fault monitoring
85.
fault prediction
86.
fault protection
87.
fault redundancy
88.
fault resilience
89.
fault ride through
90.
Fault ride through enhancement
91.
fault signal
92.
fault simulastion
93.
fault simulation
94.
fault simulation with critical path tracing
95.
fault tolerance
96.
fault tolerant
97.
fault tolerant control
98.
fault tolerant operation
99.
fault tolerant router design
100.
fault tolerant systems
101.
fault tree analysis
102.
fault-plane solution
103.
fault-resilience
104.
fault-resistant
105.
fault-ride-through (FRT)
106.
fault-tolerance
107.
fault-tolerant
108.
Fault-tolerant (FT) converters
109.
fault-tolerant control
110.
fault-tolerant converter
111.
functional fault model
112.
high-level control fault model
113.
high-level fault coverage
114.
high-level fault model
115.
high-level fault simulation
116.
high-level functional fault model
117.
Katun fault
118.
low-level fault redundancy
119.
no fault found
120.
No-Fault-Found
121.
open circuit fault
122.
Parallel Fault Simulation with Critical Path Backtracing
123.
parallel fault-simulation
124.
short circuit fault
125.
spectrum-based fault localization
126.
stacking fault
127.
stuck-at fault model
128.
test generation and fault diagnosis
129.
transient fault mitigation
130.
transmission lines fault
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT