2015 European Conference on Circuit Theory and Design (ECCTD) 2015
DOI: 10.1109/ecctd.2015.7300075
|View full text |Cite
|
Sign up to set email alerts
|

Optimized linear complementary codes implementation for hardware trojan prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…Let U = {x ∈ F s 2 : wt(x) ≥ 2} and let V = {0}. Let f be the Boolean function defined in (5), where g ≡ 1, φ is an injection from F s 2 \U to F t 2 \V , and φ(x) = 0 for any x ∈ U. II) when s is odd (resp.…”
Section: A Some Minimal Binary Linear Codes From Known Minimal Binary...mentioning
confidence: 99%
See 1 more Smart Citation
“…Let U = {x ∈ F s 2 : wt(x) ≥ 2} and let V = {0}. Let f be the Boolean function defined in (5), where g ≡ 1, φ is an injection from F s 2 \U to F t 2 \V , and φ(x) = 0 for any x ∈ U. II) when s is odd (resp.…”
Section: A Some Minimal Binary Linear Codes From Known Minimal Binary...mentioning
confidence: 99%
“…Remark 5: Note that E 1 and E 2 can be identified as two linear codes over F p . By E 1 + E 2 = F q and E 1 ∩ E 2 = {0}, (E 1 , E 2 ) is a linear complementary pair (LCP) of codes over F p [5], [6]. We can take two subspaces E 1 and E 2 of F q , where E 2 = E ⊥…”
Section: B Minimal Linear Codes From Characteristic Functions Corresp...mentioning
confidence: 99%
“…LCD codes are also useful in information protection from side-channel attacks and hardware Trojan horses (see [4], [5], [8], [10], [16], and [17]). In [9], LCD codes have been applied in constructing good entanglement-assisted quantum error correcting codes.…”
Section: Introductionmentioning
confidence: 99%
“…This need is general in cryptography, and has specific applications when thwarting Hardware Trojan Horses (HTH) [35,34,11]. Indeed, the activation part of a HTH is impeded by masking, whereas the payload part is caught red-handed by a detection code.…”
Section: Masking and Faults Detectionmentioning
confidence: 99%