[1] SAGSTETTER F, LUKASIEWYCZ M, STEINHORST S, et al. Security challenges in automotive hardware/software architecture design[C]//DATA 2013: Proceedings of the 2013 Conference on Design, Automation and Test in Europe. San Jose, CA: EDA Consortium, 2013: 458-463. [2] MUNDHENK P, STEINHORST S, LUKASIEWYCZ M, et al. Lightweight authentication for secure automotive networks[C]//DATA 2015: Proceedings of the 2015 Conference on Design, Automation and Test in Europe. San Jose, CA: EDA Consortium, 2015: 285-288 [3] LIN C-W, ZHU Q, PHUNG C, et al. Security-aware mapping for CAN-based real-time distributed automotive systems[C]//ICCAD '13: Proceedings of the International Conference on Computer-Aided Design. Piscataway: IEEE. 2013: 115-121. [4] BIHAM E, SHAMIR A. Differential cryptanalysis of the data encryption standard[M]. Berlin: Springer-Verlag, 1993: 183-192 [5] BONEH D, DEMILLO R A, LIPTON R J. On the importance of eliminating errors in cryptographic computations[J]. Journal of Cryptology, 2001, 14(2): 101-119. [6] BERTONI G, BREVEGLIERI L, KOREN I, et al. A parity code based on concurrent fault detection for implementations of the advanced encryption standard[C]//DFT '02: Proceedings of the 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems. Washington, DC: IEEE Computer Society, 2002: 51-59. [7] BERTONI G, BREVEGLIERI L, KOREN I, et al. Error analysis and detection procedures for a hardware implementation of the advanced encryption standard[J]. IEEE Transactions on Computers, 2003, 52(4): 492-505. [8] BLÖEMER J, SEIFERT J-P. Fault based cryptanalysis of the Advanced Encryption Standard (AES)[C]//FC 2003: Proceedings of the 7th International Conference on Financial Cryptography, LNCS 2742. New York: ACM, 2001: 162-181. [9] KARRI R, KUZNETSOV G, GOESSEL M. Parity based concurrent error detection of substitution permutation network block ciphers[C]//CHES 2003: Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2779. Berlin: Springer-Verlag, 2003: 113-124. [10] MA K, WU K. LOEDAR: a low cost error detection and recovery scheme for ECC[C]//DATA 2011: Proceedings of the 2011 Conference on Design, Automation and Test in Europe. San Jose, CA: EDA Consortium, 2011: 1-6. [11] KOCHER P, LEE R, MCGRAW G, et al. Security as a new dimension in embedded system design[C]//DAC 2004: Proceedings of the 41th Design Automation Conference. Piscataway, NJ: IEEE, 2004: 753-760. [12] HWANG D D, SCHAUMONT P, TIRI K, et al. Securing embedded systems[J]. IEEE Security and Privacy, 2006, 4(2): 40-49. [13] JIANG K, ELES P, PENG Z. Optimization of message encryption for distributed embedded systems with real-time constraints[C]//Proceedings of the 2011 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems. Piscataway, NJ: IEEE, 2011: 243-248 [14] JIANG K, ELES P, PENG Z. Co-design technique for distributed real-time embedded systems with communication security constraints[C]//DATE '12: Proceedings of the 2012 Conference on Design, Automation and Test in Europe. San Jose, CA: EDA Consortium, 2012: 947-952. [15] AUMüLLER C, BIER P, FISCHER W, et al. Fault attacks on RSA with CRT: concrete results and practical countermeasures[C]//CHES 2002: Proceedings of the 4th International Workshop Redwood Shores on Cryptographic Hardware and Embedded Systems, LNCS 2523. Berlin: Springer-Verlag, 2002: 260-275. [16] ELES P, PENG Z, POP P, et al. Scheduling with bus access optimization for distributed embedded systems[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems——Special Issue on the 11th International Symposium on System-Level Synthesis And Design (ISSS '98), 2000, 8(5): 472-491. [17] KIRKPATRICK S, GELATT C D, VECCHI M P. Optimization by simulated annealing[J]. Science, 1983, 220(4598): 671-680. [18] ZHANG Z, SCHWARTZ S, WAGNER L, et al. A greedy algorithm for aligning DNA sequences[J]. Journal of Computational Biology, 2000, 7(1/2): 203-214. |