Author of the publication

A Lightweight, Plug-and-Play and Autonomous JTAG Authentication IP for Secure Device Testing.

, , , , , and . ETS, page 1-4. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compression-based SoC Test Infrastructures., , and . VLSI-SoC (Selected Papers), volume 291 of IFIP, page 1-15. Springer, (2007)A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans., , , , and . IOLTS, page 49-54. IEEE, (2014)Scan chain encryption for the test, diagnosis and debug of secure circuits., , , , , and . ETS, page 1-6. IEEE, (2017)Laser attacks on integrated circuits: From CMOS to FD-SOI., , , , , , , , , and . DTIS, page 1-6. IEEE, (2014)High-level synthesis for easy testability., , and . ED&TC, page 198-206. IEEE Computer Society, (1995)Analyzing testability from behavioral to RT level., , and . ED&TC, page 158-165. IEEE Computer Society, (1997)On Preventing SAT Attack with Decoy Key-Inputs., , , and . ISVLSI, page 114-119. IEEE, (2021)Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model., , , , , , , , , and 3 other author(s). FDTC, page 1-6. IEEE Computer Society, (2018)A secure scan design methodology., , , and . DATE, page 1177-1178. European Design and Automation Association, Leuven, Belgium, (2006)Resynthesis-based Attacks Against Logic Locking., , , , , and . ISQED, page 1-8. IEEE, (2023)