Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
fault-injection attack (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/131)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Early RTL analysis for SCA vulnerability in fuzzy extractors of memory-based PUF enabled devices
Lai, Xinhui
;
Jenihhin, Maksim
;
Selims, Georgios
arXiv.org
2020
/
6 p. : ill
https://doi.org/10.48550/arXiv.2008.08409
https://arxiv.org/abs/2008.08409
journal article
Related publications
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
Number of records 1, displaying
1 - 1
keyword
131
1.
fault-injection attack
2.
false data injection attack
3.
ghost injection attack
4.
fault injection
5.
Fault Injection Simulation
6.
fiber-reinforced composites and injection molding
7.
Gate Injection Transistor (GIT)
8.
gating-aware error injection
9.
injection molding
10.
injection of technical water
11.
manual hydrodynamic injection
12.
power injection
13.
reactive power injection
14.
zero injection phase
15.
attack detection
16.
attack graphs
17.
attack model
18.
attack sophistication
19.
attack trees
20.
attack vectors
21.
attack visualisation
22.
botnet attack
23.
corrosive attack
24.
cyber-attack
25.
cyber-attack pathways
26.
Denial of Service (DoS) attack
27.
discovery of attack scenarios
28.
DoS attack
29.
highly targeted attack
30.
iming side-channel attack
31.
Low-and-Slow DoS attack
32.
manufacturing-time attack
33.
oracle-less attack
34.
quantum attack
35.
ransomware attack
36.
removal attack
37.
Return of the Coppersmith’s Attack (ROCA)
38.
return of the Coppersmith’s attack vulnerability
39.
SAT attack
40.
SAT-based attack
41.
side-channel attack
42.
Side-Channel Attack Detection
43.
asynchronous fault detection
44.
automatic fault diagnosis
45.
bearing fault diagnosis
46.
bi-directional fault monitoring devices
47.
conditional fault collapsing
48.
control fault models
49.
critical path fault tracing
50.
cross-layer fault tolerance
51.
cross-layered fault management
52.
extended fault class
53.
fault currents
54.
fault analysis
55.
fault analysis model
56.
fault classification
57.
fault classification
58.
fault collapsing
59.
fault compensation
60.
fault coverage
61.
fault current and voltage measurements
62.
Fault current limite
63.
fault current limiter
64.
fault detection
65.
fault detection and diagnoses
66.
fault detection and diagnosis
67.
fault diagnosis
68.
fault diagnostic
69.
fault diagnostic resolution
70.
fault diagnostics
71.
fault dignosis
72.
fault effects
73.
fault emulation
74.
fault equivalence and dominance
75.
fault handling
76.
fault handling strategy
77.
fault indicator
78.
fault Interruption
79.
fault localization
80.
fault location
81.
fault management
82.
fault masking
83.
fault modeling
84.
fault models
85.
fault monitoring
86.
fault prediction
87.
fault protection
88.
fault redundancy
89.
fault resilience
90.
fault ride through
91.
Fault ride through enhancement
92.
fault signal
93.
fault simulastion
94.
fault simulation
95.
fault simulation with critical path tracing
96.
fault tolerance
97.
fault tolerant
98.
fault tolerant control
99.
fault tolerant operation
100.
fault tolerant router design
101.
fault tolerant systems
102.
fault tree analysis
103.
fault-plane solution
104.
fault-resilience
105.
fault-resistant
106.
fault-ride-through (FRT)
107.
fault-tolerance
108.
fault-tolerant
109.
Fault-tolerant (FT) converters
110.
fault-tolerant control
111.
fault-tolerant converter
112.
functional fault model
113.
high-level control fault model
114.
high-level fault coverage
115.
high-level fault model
116.
high-level fault simulation
117.
high-level functional fault model
118.
Katun fault
119.
low-level fault redundancy
120.
no fault found
121.
No-Fault-Found
122.
open circuit fault
123.
Parallel Fault Simulation with Critical Path Backtracing
124.
parallel fault-simulation
125.
short circuit fault
126.
spectrum-based fault localization
127.
stacking fault
128.
stuck-at fault model
129.
test generation and fault diagnosis
130.
transient fault mitigation
131.
transmission lines fault
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT