Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking split manufacturing: An information-theoretic approach with secure layout techniques., , , , , and . ICCAD, page 329-326. IEEE, (2017)Provably-Secure Logic Locking: From Theory To Practice., , , , , and . CCS, page 1601-1618. ACM, (2017)UN-SPLIT: Attacking Split Manufacturing Using Link Prediction in Graph Neural Networks., , , , , and . SPACE, volume 14412 of Lecture Notes in Computer Science, page 197-213. Springer, (2023)Preventing Fault Attacks Using Fault Randomization with a Case Study on AES., , , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 343-355. Springer, (2015)Preventing fault attacks using fault randomisation with a case study on AES., , , and . Int. J. Appl. Cryptogr., 3 (3): 225-235 (2017)Customized locking of IP blocks on a multi-million-gate SoC., , , and . ICCAD, page 59. ACM, (2018)Attacking Split Manufacturing from a Deep Learning Perspective., , , , , , , and . DAC, page 135. ACM, (2019)What to Lock?: Functional and Parametric Locking., , , , , and . ACM Great Lakes Symposium on VLSI, page 351-356. ACM, (2017)ATPG-based cost-effective, secure logic locking., , , and . VTS, page 1-6. IEEE Computer Society, (2018)AEC: A Practical Scheme for Authentication with Error Correction., , , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 155-170. Springer, (2014)