References
Shen C X, Zhang H G, Feng D G, et al. Survey of information security. Sci China Ser F-Inf Sci, 2007, 50: 273–298
Tria A, Choukri H. Invasive attacks. In: Encyclopedia of Cryptography & Security. Boston: Springer, 2011. 623–629
Xuan T N, Danger J L, Guilley S, et al. Cryptographically secure shield for security IPs protection. IEEE Trans Comput, 2017, 66: 354–360
Briais S, Cioranesco J M, Danger J L, et al. Random active shield. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography, Piscataway, 2012. 103–113
Briais S, Caron S, Cioranesco J M, et al. 3D hardware canaries. In: Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2012. 1–22
Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to Algorithms. 3rd ed. Cambridge: MIT Press, 2009. 65–97, 359–397
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 61376032) and Tianjin Science and Technology Project of China (Grant No. 15ZCZDGX00180).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xin, R., Yuan, Y., He, J. et al. High-efficient generation algorithm for large random active shield. Sci. China Inf. Sci. 62, 39108 (2019). https://doi.org/10.1007/s11432-018-9474-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-018-9474-3