Author of the publication

HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication.

, , , , and . FPGA, page 52. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication., , , , and . ACM Trans. Embed. Comput. Syst., 22 (4): 64:1-64:28 (July 2023)Transpose-xen: virtualized mixed-criticality through dynamic allocation., and . SAC, page 3-12. ACM, (2022)Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems., , , , and . HPCA, page 139-152. IEEE, (2021)PreFAM: Understanding the Impact of Prefetching in Fabric-Attached Memory Architectures., , , , and . MEMSYS, page 323-334. ACM, (2020)SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs., , and . ISCAS, page 1-5. IEEE, (2023)Towards resilient analog in-memory deep learning via data layout re-organization., , , and . DAC, page 859-864. ACM, (2022)Avoiding TLB Shootdowns Through Self-Invalidating TLB Entries., , , , and . PACT, page 273-287. IEEE Computer Society, (2017)Persistently-Secure Processors: Challenges and Opportunities for Securing Non-Volatile Memories., , , , and . ISVLSI, page 610-614. IEEE, (2019)Non-volatile memory host controller interface performance analysis in high-performance I/O systems., , and . ISPASS, page 145-154. IEEE Computer Society, (2015)Salus: Efficient Security Support for CXL-Expanded GPU Memory., , , and . HPCA, page 1-15. IEEE, (2024)