Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structured Design and Evaluation of a Resistor-Based PUF Robust Against PVT-Variations., , , , , and . DDECS, page 93-98. IEEE, (2023)Sizing analog circuits using an SQP and Branch and Bound based approach., , and . ICECS, page 37-40. IEEE, (2010)PAG-IoT: A PUF and AEAD Enabled Trusted Hardware Gateway for IoT Devices., , and . ISVLSI, page 500-505. IEEE, (2020)Bringing Analog Design Tools to Security: Modeling and Optimization of a Low Area Probing Detector., , , and . SMACD, page 1-4. IEEE, (2018)Testing and Reliability Enhancement of Security Primitives., , , , , , , , and . DFT, page 1-8. IEEE, (2021)Analysis and Protection of the Two-Metric Helper Data Scheme., , , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 279-302. Springer, (2021)Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID., , and . WIFS, page 1-6. IEEE, (2019)Self-secured PUF: Protecting the Loop PUF by Masking., , and . COSADE, volume 12244 of Lecture Notes in Computer Science, page 293-314. Springer, (2020)SEPUFSoC: Using PUFs for Memory Integrity and Authentication in Multi-Processors System-on-Chip., , and . ACM Great Lakes Symposium on VLSI, page 39-44. ACM, (2018)Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF., and . COSADE, volume 14595 of Lecture Notes in Computer Science, page 157-176. Springer, (2024)