Publication:
Statistical Effective Fault Attacks: The Other Side of the Coin
| dc.contributor.author | Vafaei, Navid | |
| dc.contributor.author | Zarei, Sara | |
| dc.contributor.author | Bagheri, Nasour | |
| dc.contributor.author | Eichlseder, Maria | |
| dc.contributor.author | Primas, Robert | |
| dc.contributor.author | Soleimany, Hadi | |
| dc.date.accessioned | 2022-06-08T09:22:41Z | |
| dc.date.available | 2022-06-01T02:19:48Z | |
| dc.date.available | 2022-06-08T09:22:41Z | |
| dc.date.issued | 2022 | |
| dc.description.wosFundingText | This work was supported by the European Research Council (ERC) through the European Union's (EU) Horizon 2020 Research and Innovation Program under Grant 681402. | |
| dc.identifier.doi | 10.1109/TIFS.2022.3172634 | |
| dc.identifier.issn | 1556-6013 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/39914 | |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | |
| dc.source.beginpage | 1855 | |
| dc.source.endpage | 1867 | |
| dc.source.issue | na | |
| dc.source.journal | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | |
| dc.source.numberofpages | 13 | |
| dc.source.volume | 17 | |
| dc.title | Statistical Effective Fault Attacks: The Other Side of the Coin | |
| dc.type | Journal article | |
| dspace.entity.type | Publication | |
| Files | ||
| Publication available in collections: |