Skip to main content
Log in

High-efficient generation algorithm for large random active shield

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Shen C X, Zhang H G, Feng D G, et al. Survey of information security. Sci China Ser F-Inf Sci, 2007, 50: 273–298

    Article  MATH  Google Scholar 

  2. Tria A, Choukri H. Invasive attacks. In: Encyclopedia of Cryptography & Security. Boston: Springer, 2011. 623–629

    Google Scholar 

  3. Xuan T N, Danger J L, Guilley S, et al. Cryptographically secure shield for security IPs protection. IEEE Trans Comput, 2017, 66: 354–360

    MathSciNet  MATH  Google Scholar 

  4. Briais S, Cioranesco J M, Danger J L, et al. Random active shield. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography, Piscataway, 2012. 103–113

    Google Scholar 

  5. Briais S, Caron S, Cioranesco J M, et al. 3D hardware canaries. In: Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2012. 1–22

    Google Scholar 

  6. Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to Algorithms. 3rd ed. Cambridge: MIT Press, 2009. 65–97, 359–397

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61376032) and Tianjin Science and Technology Project of China (Grant No. 15ZCZDGX00180).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiqiang Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xin, R., Yuan, Y., He, J. et al. High-efficient generation algorithm for large random active shield. Sci. China Inf. Sci. 62, 39108 (2019). https://doi.org/10.1007/s11432-018-9474-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-018-9474-3

Navigation