Author of the publication

Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures).

, , and . HOST, page 80-90. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simultaneous Scheduling and Allocation for Cost Constrained Optimal Architectural Synthesis., and . DAC, page 2-7. ACM, (1991)EM Fault Injection on ARM and RISC-V., , and . ISQED, page 206-212. IEEE, (2020)EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA., , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 250-264. Springer, (2005)Efficient Techniques for High-Speed Elliptic Curve Cryptography., and . CHES, volume 6225 of Lecture Notes in Computer Science, page 80-94. Springer, (2010)Methodology for EM Fault Injection: Charge-based Fault Model., and . DATE, page 256-259. IEEE, (2019)Counteracting power analysis attack using Static Single-ended Logic., , and . ISCAS, page 721-724. IEEE, (2011)A Propagation Rate Based Splitting Heuristic for Divide-and-Conquer Solvers., , , , , , and . SAT, volume 10491 of Lecture Notes in Computer Science, page 251-260. Springer, (2017)Optimal Scheduling and Allocation of Embedded VLSI Chips.. DAC, page 116-119. IEEE Computer Society Press, (1992)Security wrappers and power analysis for SoC technologies., and . CODES+ISSS, page 162-167. ACM, (2003)Power Minimization in Heterogeneous Processing., and . HICSS (1), page 330-337. IEEE Computer Society, (1996)