Author of the publication

Hardware-based attacks to compromise the cryptographic security of an election system.

, , , , and . ICCD, page 153-156. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MANTIS: Machine Learning-Based Approximate ModeliNg of RedacTed Integrated CircuitS., , and . DATE, page 1-6. IEEE, (2023)Transparency-based hierarchical test generation for modular RTL designs., , , and . ISCAS, page 689-692. IEEE, (2000)Exploiting Off-Line Hierarchical Test Paths in Module Diagnosis and On-Line Test., and . LATW, page 250-255. IEEE, (2000)Secure Logic Locking with Strain-Protected Nanomagnet Logic., , , , , , , , , and 3 other author(s). DAC, page 127-132. IEEE, (2021)Hardware Dithering: A Run-Time Method for Trojan Neutralization in Wireless Cryptographic ICs., , , and . ITC, page 1-7. IEEE, (2018)Integrated optimization of semiconductor manufacturing: A machine learning approach., and . ITC, page 1-10. IEEE Computer Society, (2012)Spatial estimation of wafer measurement parameters using Gaussian process models., , , and . ITC, page 1-8. IEEE Computer Society, (2012)Subtle Anomaly Detection of Microscopic Probes using Deep learning based Image Completion., , , , , and . ITC, page 1-3. IEEE, (2019)A field programmable transistor array featuring single-cycle partial/full dynamic reconfiguration., , , , , and . DATE, page 1336-1341. IEEE, (2017)Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution., and . DATE, page 1580-1585. IEEE, (2018)