Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Holistic Power Side-Channel Leakage Assessment: Towards a Robust Multidimensional Metric., , and . ICCAD, page 1-8. ACM, (2019)Synthesizable Higher-Order Functions for C++., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (11): 2835-2844 (2018)A Unified Model for Gate Level Propagation Analysis., , , , , and . CoRR, (2020)Hiding Intermittent Information Leakage with Architectural Support for Blinking., , , , , , and . ISCA, page 638-649. IEEE Computer Society, (2018)Quantifying hardware security using joint information flow analysis., , and . DATE, page 1523-1528. IEEE, (2016)Benchmarking Video with the Surgical Image Registration Generator (SIRGn) Baseline., , , , and . ISVC (2), volume 11845 of Lecture Notes in Computer Science, page 320-331. Springer, (2019)Statistical Metrics of Hardware Security.. University of California, San Diego, USA, (2019)base-search.net (ftcdlib:qt1ws1z7k4).Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking., , , , , , , , , and 25 other author(s). CoRR, (2020)An Architecture for Learning Stream Distributions with Application to RNG Testing., and . DAC, page 15:1-15:6. ACM, (2017)Towards Property Driven Hardware Security., , , and . MTV, page 51-56. IEEE Computer Society, (2016)