Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name SLPSK, Patanjali
add a person with the name SLPSK, Patanjali
 

Other publications of authors with the same name

Trusted Electronic Systems with Untrusted COTS., , , and . ISQED, page 198-203. IEEE, (2021)GANDALF: A fine-grained hardware-software co-design for preventing memory attacks., , , and . CoRR, (2017)MeLPUF: Memory in Logic PUF., , , and . CoRR, (2020)Trust Issues in Microelectronics: The Concerns and the Countermeasures., , and . IEEE Consumer Electron. Mag., 9 (6): 72-83 (2020)White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis., , , , and . SIGCOMM Posters and Demos, page 122-124. ACM, (2019)SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware., , , , , and . DATE, page 310-313. IEEE, (2020)Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations., , and . ASP-DAC, page 417-422. IEEE, (2022)Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection., , , and . ICCAD, page 1-8. ACM, (2019)Depending on HTTP/2 for Privacy? Good Luck!, , , , and . DSN, page 278-285. IEEE, (2020)Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER., , , , and . IEEE Comput. Archit. Lett., 19 (1): 9-12 (2020)