Author of the publication

Formal Vulnerability Analysis of Security Components.

, , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (8): 1358-1369 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory error resilient detection for massive MIMO systems., and . EUSIPCO, page 1623-1627. IEEE, (2016)Test and Reliability Challenges for Approximate Circuitry.. IEEE Embed. Syst. Lett., 10 (1): 26-29 (2018)Toward Error-Correcting Architectures for Cryptographic Circuits Based on Rabii-Keren Codes., , , and . IEEE Embed. Syst. Lett., 11 (4): 115-118 (2019)Failure mechanisms and test methods for the SRAM TVC write-assist technique., , , and . ETS, page 1-2. IEEE, (2016)Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning., , , , and . CAAI Trans. Intell. Technol., 6 (2): 180-191 (2021)Guest Editors' Introduction: Stochastic Computing for Neuromorphic Applications., , , and . IEEE Des. Test, 38 (6): 5-15 (2021)Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)., , , and . Dagstuhl Reports, 9 (7): 94-116 (2019)Selective Hardening: Toward Cost-Effective Error Tolerance., and . IEEE Des. Test Comput., 28 (3): 54-63 (2011)An Open-Source Area-Optimized ECEG Cryptosystem in Hardware., , and . ISVLSI, page 120-125. IEEE, (2020)Exploring the Mysteries of System-Level Test., , , , , , , , , and . CoRR, (2021)