Author of the publication

Hardware-based attacks to compromise the cryptographic security of an election system.

, , , , and . ICCD, page 153-156. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-based attacks to compromise the cryptographic security of an election system., , , , and . ICCD, page 153-156. IEEE Computer Society, (2016)Machine Learning-Based Hotspot Detection: Fallacies, Pitfalls and Marching Orders., , and . ICCAD, page 1-8. ACM, (2019)VIPER: A Versatile and Intuitive Pattern GenERator for Early Design Space Exploration., , and . ITC, page 1-7. IEEE, (2019)CASPER: CAD Framework for a Novel Transistor-Level Programmable Fabric., , , , , , and . ISCAS, page 1-5. IEEE, (2020)ATTEST: Application-Agnostic Testing of a Novel Transistor-Level Programmable Fabric., , , , , , and . VTS, page 1-6. IEEE, (2020)Functional Obfuscation of Hardware Accelerators through Selective Partial Design Extraction onto an Embedded FPGA., , , , , , , and . ACM Great Lakes Symposium on VLSI, page 171-176. ACM, (2019)Design Space Exploration for Hotspot Detection., and . MTV, page 73-77. IEEE, (2019)Enhanced hotspot detection through synthetic pattern generation and design of experiments., , and . VTS, page 1-6. IEEE Computer Society, (2018)PatternPaint: Generating Layout Patterns Using Generative AI and Inpainting Techniques., , , , , and . CoRR, (2024)On Improving Hotspot Detection Through Synthetic Pattern-Based Database Enhancement., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (12): 2522-2527 (2021)