News
This contribution is concerned with the question whether an adversary can automatically manipulate an unknown FPGA bitstream realizing a cryptographic primitive such that the underlying secret key is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results