Author of the publication

Incorporating Error Detection and Online Reconfiguration into a Regular Architecture for the Advanced Encryption Standard.

, , and . DFT, page 72-80. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective analytical delay model for transistor sizing., and . ASP-DAC, page 387-392. ACM Press, (2005)A low energy dual-mode adder., , and . Comput. Electr. Eng., 40 (5): 1524-1537 (2014)The Optimal Fan-Out of Clock Network for Power Minimization by Adaptive Gating., and . IEEE Trans. Very Large Scale Integr. Syst., 20 (10): 1772-1780 (2012)On the effect of floorplanning on the yield of large area integrated circuits., and . IEEE Trans. Very Large Scale Integr. Syst., 5 (1): 3-14 (1997)On Reliability Trojan Injection and Detection., , and . J. Low Power Electron., 8 (5): 674-683 (2012)Complete and partial fault tolerance of feedforward neural nets., and . IEEE Trans. Neural Networks, 6 (2): 446-456 (1995)Countermeasures against Branch Target Buffer Attacks., , , and . FDTC, page 75-79. IEEE Computer Society, (2007)Countermeasures against fault attacks on software implemented AES: effectiveness and cost., , , , and . WESS, page 7. ACM, (2010)Connectivity and performance tradeoffs in the cascade correlation learning architecture., and . IEEE Trans. Neural Networks, 5 (6): 930-935 (1994)Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation., , , , , and . RFIDSec, volume 7055 of Lecture Notes in Computer Science, page 48-60. Springer, (2011)