2015
DOI: 10.1109/tvlsi.2014.2382715
|View full text |Cite
|
Sign up to set email alerts
|

Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…According to the analysis of neural network, it can be clearly seen that in the application of BP neural network model in the company, although the output value of BP network is relatively low, on the whole, it fluctuates slightly between the satisfactory value, and the stability is relatively high [28][29][30]. This paper believes that the decision requirements are met.…”
Section: E Discussionmentioning
confidence: 85%
“…According to the analysis of neural network, it can be clearly seen that in the application of BP neural network model in the company, although the output value of BP network is relatively low, on the whole, it fluctuates slightly between the satisfactory value, and the stability is relatively high [28][29][30]. This paper believes that the decision requirements are met.…”
Section: E Discussionmentioning
confidence: 85%
“…For sensitive systems, degraded performance can lead to disastrous results; consequently, research has explored strategies to reduce errors and provide higher reliability with acceptable overhead [16,17,18,19,20,21,22,23,24]. In [16], a ingerprint-based technique for detecting malicious programs in hardware is presented.…”
Section: Previous Workmentioning
confidence: 99%
“…In [16], a ingerprint-based technique for detecting malicious programs in hardware is presented. Fault diagnosis approaches based on multiterm signatures against false-alarms, which may be unacceptable in critical intelligent infrastructures, are presented in [17]. In [18] and [19], fault detection mechanisms are presented for the lightweight cryptographic block cipher QARMA and polynomial basis inversions, respectively.…”
Section: Previous Workmentioning
confidence: 99%
See 2 more Smart Citations