Author of the publication

A non-volatile memory based physically unclonable function without helper data.

, , and . ICCAD, page 148-153. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware., , , , , and . DATE, page 310-313. IEEE, (2020)An automated configurable Trojan insertion framework for dynamic trust benchmarks., , , and . DATE, page 1598-1603. IEEE, (2018)Role of power grid in side channel attack and power-grid-aware secure design., , , , , , , and . DAC, page 78:1-78:9. ACM, (2013)The Metric Matters: The Art of Measuring Trust in Electronics., , and . DAC, page 222. ACM, (2019)Ultralow-power data compression for implantable bladder pressure monitor: Algorithm and hardware implementation., , , , and . BioCAS, page 500-503. IEEE, (2016)Authentication and traceability of food products through the supply chain using NQR spectroscopy., , , , and . BioCAS, page 1-4. IEEE, (2017)Sequential hardware Trojan: Side-channel aware design and placement., , , , and . ICCD, page 297-300. IEEE Computer Society, (2011)VL-ECC: Variable Data-Length Error Correction Code for Embedded Memory in DSP Applications., , and . IEEE Trans. Circuits Syst. II Express Briefs, 61-II (2): 120-124 (2014)