Author of the publication

Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures.

, , , , and . ISVLSI, page 574-579. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An ASIP for image enhancement applications in spatial domain using LISA., , , and . ReTIS, page 175-179. IEEE, (2011)On-chip RO-Sensor for Recycled IC Detection., , , , and . iNIS, page 252-256. IEEE, (2017)Security Enhancements to System on Chip Devices for IoT Perception Layer., , , , and . iNIS, page 151-156. IEEE, (2017)A Novel Holistic Security Framework for In-Field Firmware Updates., , , , and . iSES, page 261-264. IEEE, (2018)A Flexible Pay-per-Device Licensing Scheme for FPGA IP Cores., , , , and . ISVLSI, page 677-682. IEEE Computer Society, (2017)Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures., , , , and . ISVLSI, page 574-579. IEEE Computer Society, (2017)High-performance noise tolerant comparator design for arithmetic circuits., and . ISPACS, page 1-4. IEEE, (2016)MIL based visual object tracking with kernel and scale adaptation., and . Signal Process. Image Commun., (2017)Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating Hardwares., and . iSES, page 272-275. IEEE, (2019)PI, PID and Fuzzy logic controller for Reactive Power and Harmonic Compensation, and . International Journal on Electrical and Power Engineering, 1 (3): 5 (December 2010)