2019
DOI: 10.1016/j.tcs.2019.02.021
|View full text |Cite
|
Sign up to set email alerts
|

Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…It also demonstrates F I G U R E 1 0 Illustration of the error masking probability QðeÞ in iterative implementation of SD-SHO for various FSM benchmarks. FSM, finite state machine, SD-SHO, security-dominated state assignment method with a satisfactory level of hardware optimization DAS AND PANCHANATHAN - 13 that except for the case of 's1', 'dk16', and 's1a', SD-SHO requires less area (i.e. literal count) as compared with JEDI [24].…”
Section: Performance Assessment Of Sd-sho For Fsm Optimalitymentioning
confidence: 99%
See 3 more Smart Citations
“…It also demonstrates F I G U R E 1 0 Illustration of the error masking probability QðeÞ in iterative implementation of SD-SHO for various FSM benchmarks. FSM, finite state machine, SD-SHO, security-dominated state assignment method with a satisfactory level of hardware optimization DAS AND PANCHANATHAN - 13 that except for the case of 's1', 'dk16', and 's1a', SD-SHO requires less area (i.e. literal count) as compared with JEDI [24].…”
Section: Performance Assessment Of Sd-sho For Fsm Optimalitymentioning
confidence: 99%
“…Hence, Equation ( 12) is reduced to Equation (14). In a hypercube defined by Equation (13), ν denotes a specific vertex, whereas a symbolizes the dimension. z 2 represents the analytical value of ν, and its value varies from −1 to 1.…”
Section: Fsm Optimization Through State Assignmentmentioning
confidence: 99%
See 2 more Smart Citations