The complexity of modern integrated circuits (ICs) necessitates collabor...
Recent work has highlighted the risks of intellectual property (IP) pira...
Artificial intelligence (AI) and machine learning (ML) techniques have b...
Side-channel attacks extracting sensitive data from implementations have...
Profiled side-channel analysis (SCA) leverages leakage from cryptographi...
Due to its sound theoretical basis and practical efficiency, masking has...
The current chapter aims at establishing a relationship between artifici...
This chapter is on the security assessment of artificial intelligence (A...
Over the past decades, quantum technology has seen consistent progress, ...
Hardware intellectual property (IP) theft is a major issue in today's
gl...
In this paper we describe our experience in designing and evaluating our...
In the context of hardware trust and assurance, reverse engineering has ...
Security of information passing through the Internet is threatened by to...