Author of the publication

A 0.16pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance.

, , , , and . ASP-DAC, page 627-632. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strong PUF Security Metrics: Response Sensitivity to Small Challenge Perturbations., , , and . ISQED, page 1-10. IEEE, (2022)Innovation Practices Track: Security in Test and Test for Security., , , , and . VTS, page 1. IEEE, (2022)An Efficient End to End Design of Rijndael Cryptosystem in 0.18 ? CMOS., and . VLSI Design, page 405-410. IEEE Computer Society, (2005)Invited Paper: Oblivious Transfer Protocol without Physical Transfer of Hardware Root-of-Trust., , and . ApPLIED@PODC, page 6:1-6:9. ACM, (2023)Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks., , and . VLSI Design, page 113-118. IEEE Computer Society, (2012)Using Tweaks to Design Fault Resistant Ciphers., , and . VLSID, page 585-586. IEEE Computer Society, (2016)Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands., , and . PROOFS, volume 49 of EPiC Series in Computing, page 33-49. EasyChair, (2017)Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms., , , , and . PROOFS, volume 7 of Kalpa Publications in Computing, page 1-15. EasyChair, (2018)Rapid detection of rowhammer attacks using dynamic skewed hash tree., , , and . HASP@ISCA, page 7:1-7:8. ACM, (2018)ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures., , , , and . DAC, page 136. ACM, (2019)