Author of the publication

Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure.

, , , , , and . J. Hardw. Syst. Secur., 4 (4): 343-360 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications., and . IEEE Des. Test, 34 (4): 26-33 (2017)Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design., , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 79-93 (2018)Incremental-Precision Based Feature Computation and Multi-Level Classification for Low-Energy Internet-of-Things., and . IEEE J. Emerg. Sel. Topics Circuits Syst., 8 (4): 822-835 (2018)Functional encryption of integrated circuits by key-based hybrid obfuscation., , and . ACSSC, page 484-488. IEEE, (2017)Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure., , , , , and . J. Hardw. Syst. Secur., 4 (4): 343-360 (2020)AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators., , , , , and . DAC, page 1-6. IEEE, (2023)Security Risk Assessment of Server Hardware Architectures Using Graph Analysis.. AsianHOST, page 1-4. IEEE, (2021)Low-Energy Architectures of Linear Classifiers for IoT Applications using Incremental Precision and Multi-Level Classification., and . ACM Great Lakes Symposium on VLSI, page 291-296. ACM, (2018)Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors., , and . ISPASS, page 223-225. IEEE, (2020)Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads., , and . HASP@MICRO, page 2:1-2:9. ACM, (2020)