Author of the publication

Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning.

, , , , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSOFuzz: Fuzzing Processors with Particle Swarm Optimization., , , , and . ICCAD, page 1-9. IEEE, (2023)FlowBazaar: A Market-Mediated Software Defined Communications Ecosystem at the Wireless Edge., , , , , , , , , and . CoRR, (2018)DETERRENT: Detecting Trojans Using Reinforcement Learning., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (1): 57-70 (January 2024)MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors., , , , and . CoRR, (2023)DETERRENT: detecting trojans using reinforcement learning., , , , and . DAC, page 697-702. ACM, (2022)AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning., , , and . CoRR, (2024)Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges., , , and . ISOCC, page 217-218. IEEE, (2022)ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning., , , , , and . DAC, page 1-6. IEEE, (2023)Security of Cloud FPGAs: A Survey., , , and . CoRR, (2020)Make Every Move Count: LLM-based High-Quality RTL Code Generation Using MCTS., , , , , , and . CoRR, (2024)