↓ Skip to main content

Cryptographic Hardware and Embedded Systems -- CHES 2013

Overview of attention for book
Cover of 'Cryptographic Hardware and Embedded Systems -- CHES 2013'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Simplicity of Converting Leakages from Multivariate to Univariate
  3. Altmetric Badge
    Chapter 2 Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
  4. Altmetric Badge
    Chapter 3 Profiling DPA: Efficacy and Efficiency Trade-Offs
  5. Altmetric Badge
    Chapter 4 Non-invasive Spoofing Attacks for Anti-lock Braking Systems
  6. Altmetric Badge
    Chapter 5 An Accurate Probabilistic Reliability Model for Silicon PUFs
  7. Altmetric Badge
    Chapter 6 A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
  8. Altmetric Badge
    Chapter 7 On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs
  9. Altmetric Badge
    Chapter 8 Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
  10. Altmetric Badge
    Chapter 9 Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
  11. Altmetric Badge
    Chapter 10 On Measurable Side-Channel Leaks Inside ASIC Design Primitives
  12. Altmetric Badge
    Chapter 11 A Very High Speed True Random Number Generator with Entropy Assessment
  13. Altmetric Badge
    Chapter 12 Stealthy Dopant-Level Hardware Trojans
  14. Altmetric Badge
    Chapter 13 A Differential Fault Attack on MICKEY 2.0
  15. Altmetric Badge
    Chapter 14 Improving Modular Inversion in RNS Using the Plus-Minus Method
  16. Altmetric Badge
    Chapter 15 McBits: Fast Constant-Time Code-Based Cryptography
  17. Altmetric Badge
    Chapter 16 Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
  18. Altmetric Badge
    Chapter 17 Sleuth: Automated Verification of Software Power Analysis Countermeasures
  19. Altmetric Badge
    Chapter 18 Lambda Coordinates for Binary Elliptic Curves
  20. Altmetric Badge
    Chapter 19 High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
  21. Altmetric Badge
    Chapter 20 On the Implementation of Unified Arithmetic on Binary Huff Curves
  22. Altmetric Badge
    Chapter 21 Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
  23. Altmetric Badge
    Chapter 22 Block Ciphers That Are Easier to Mask: How Far Can We Go?
  24. Altmetric Badge
    Chapter 23 Masking vs. Multiparty Computation: How Large Is the Gap for AES?
  25. Altmetric Badge
    Chapter 24 Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
  26. Altmetric Badge
    Chapter 25 Using Bleichenbacher”s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
  27. Altmetric Badge
    Chapter 26 A New Model for Error-Tolerant Side-Channel Cube Attacks
  28. Altmetric Badge
    Chapter 27 Leakage-Resilient Symmetric Encryption via Re-keying
Attention for Chapter 6: A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • Good Attention Score compared to outputs of the same age (76th percentile)
  • Good Attention Score compared to outputs of the same age and source (79th percentile)

Mentioned by

patent
2 patents

Readers on

mendeley
58 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Chapter number 6
Book title
Cryptographic Hardware and Embedded Systems - CHES 2013
Published in
Lecture notes in computer science, August 2013
DOI 10.1007/978-3-642-40349-1_6
Book ISBNs
978-3-64-240348-4, 978-3-64-240349-1
Authors

Mudit Bhargava, Ken Mai, Bhargava, Mudit, Mai, Ken

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 58 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 58 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 17 29%
Student > Master 11 19%
Researcher 10 17%
Student > Doctoral Student 3 5%
Student > Postgraduate 3 5%
Other 10 17%
Unknown 4 7%
Readers by discipline Count As %
Computer Science 25 43%
Engineering 20 34%
Physics and Astronomy 3 5%
Mathematics 2 3%
Business, Management and Accounting 1 2%
Other 2 3%
Unknown 5 9%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 6. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 01 September 2020.
All research outputs
#5,662,952
of 26,139,724 outputs
Outputs from Lecture notes in computer science
#1,638
of 8,178 outputs
Outputs of similar age
#45,266
of 211,670 outputs
Outputs of similar age from Lecture notes in computer science
#38
of 185 outputs
Altmetric has tracked 26,139,724 research outputs across all sources so far. Compared to these this one has done well and is in the 75th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,178 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.3. This one has done well, scoring higher than 78% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 211,670 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 76% of its contemporaries.
We're also able to compare this research output to 185 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 79% of its contemporaries.