Sciweavers

ISMVL
2007
IEEE
92views Hardware» more  ISMVL 2007»
14 years 6 months ago
Experimental Studies on SAT-Based ATPG for Gate Delay Faults
The clock rate of modern chips is still increasing and at the same time the gate size decreases. As a result, already slight variations during the production process may cause a f...
Stephan Eggersglüß, Daniel Tille, G&oum...
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
14 years 6 months ago
A Bridging Fault Model Where Undetectable Faults Imply Logic Redundancy
We define a robust fault model as a model where the existence of an undetectable fault implies the existence of logic redundancy, or more generally, a suboptimality in the synthe...
Irith Pomeranz, Sudhakar M. Reddy
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 6 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
DATE
2009
IEEE
94views Hardware» more  DATE 2009»
14 years 6 months ago
Selection of a fault model for fault diagnosis based on unique responses
- We describe a preprocessing step to fault diagnosis of an observed response obtained from a faulty chip. In this step, a fault model for diagnosing the observed response is selec...
Irith Pomeranz, Sudhakar M. Reddy
CARDIS
2010
Springer
187views Hardware» more  CARDIS 2010»
14 years 6 months ago
Improved Fault Analysis of Signature Schemes
At ACISP 2004, Giraud and Knudsen presented the first fault analysis of DSA, ECDSA, XTR-DSA, Schnorr and ElGamal signatures schemes that considered faults affecting one byte. The...
Christophe Giraud, Erik Woodward Knudsen, Michael ...
ICCAD
2002
IEEE
142views Hardware» more  ICCAD 2002»
14 years 8 months ago
SAT and ATPG: Boolean engines for formal hardware verification
In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
Armin Biere, Wolfgang Kunz