Author of the publication

True Random Number Generation using Latency Variations of Commercial MRAM Chips.

, , , and . ISQED, page 510-515. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disassembling Software Instruction Types through Impedance Side-channel Analysis., and . HOST, page 227-237. IEEE, (2023)Exploiting DRAM Latency Variations for Generating True Random Numbers., , , , and . ICCE, page 1-6. IEEE, (2019)Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips., , and . IEEE Trans. Inf. Forensics Secur., (2024)TI-TRNG: Technology Independent True Random Number Generator., , , , , and . DAC, page 179:1-179:6. ACM, (2014)Independent detection of recycled flash memory: Challenges and solutions., , , , and . HOST, page 89-95. IEEE Computer Society, (2018)Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications., , and . CoRR, (2021)A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips., , and . ACM J. Emerg. Technol. Comput. Syst., 19 (2): 11:1-11:25 (April 2023)A Machine Learning-Based System to Recommend Appropriate Military Training Program for a Soldier., , , , and . MIET (2), volume 491 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 151-161. Springer, (2022)Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network., and . CoRR, (2019)Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software., and . CoRR, (2023)