Author of the publication

Reliable and high performance STT-MRAM architectures based on controllable-polarity devices.

, , , , , and . ICCD, page 343-350. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures., , , and . ACM Great Lakes Symposium on VLSI, page 147-152. ACM, (2018)Enhancing Hardware Security with Emerging Transistor Technologies., , , , , and . ACM Great Lakes Symposium on VLSI, page 305-310. ACM, (2016)On the Impossibility of Approximation-Resilient Circuit Locking., , and . HOST, page 161-170. IEEE, (2019)Cyclic Obfuscation for Creating SAT-Unresolvable Circuits., , , , , and . ACM Great Lakes Symposium on VLSI, page 173-178. ACM, (2017)A Security Analysis of Circuit Clock Obfuscation., , , and . Cryptogr., 6 (3): 43 (2022)Towards Machine-Learning-based Oracle-Guided Analog Circuit Deobfuscation., , , and . ITC, page 323-332. IEEE, (2024)Emerging Technology-Based Design of Primitives for Hardware Security., , , , , , , , and . ACM J. Emerg. Technol. Comput. Syst., 13 (1): 3:1-3:19 (2016)Enhancing Solver-based Generic Side-Channel Analysis with Machine Learning., and . ACM Great Lakes Symposium on VLSI, page 345-350. ACM, (2023)IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits., , and . ICCAD, page 1-7. ACM, (2019)Provably secure camouflaging strategy for IC protection., , , , , , and . ICCAD, page 28. ACM, (2016)