Proceedings of the Third Workshop on Cryptography and Security in Computing Systems 2016
DOI: 10.1145/2858930.2858933
|View full text |Cite
|
Sign up to set email alerts
|

Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Based on the results of Section 8, we select ∆ M = 1 fF ≤ C c . Subsequent processing includes a quantization with bin size ∆ Q [IHKS16] as explained in Section 6.2. However, at this stage we are interested in the fundamental properties of the design only which is why we proceed with ∆ M instead.…”
Section: Stochastic Model Of a Sensor Nodementioning
confidence: 99%
See 4 more Smart Citations
“…Based on the results of Section 8, we select ∆ M = 1 fF ≤ C c . Subsequent processing includes a quantization with bin size ∆ Q [IHKS16] as explained in Section 6.2. However, at this stage we are interested in the fundamental properties of the design only which is why we proceed with ∆ M instead.…”
Section: Stochastic Model Of a Sensor Nodementioning
confidence: 99%
“…The previously compensated and normalized data is now further processed by an equidistant quantization [IHKS16]. This is an error-reduction technique to mitigate the remaining circuit noise σ N that would otherwise cause frequent changes in the output data.…”
Section: Quantization and Error-correcting Code (Ecc)mentioning
confidence: 99%
See 3 more Smart Citations