Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layout-level Vulnerability Ranking from Electromagnetic Fault Injection., , , , , , , , and . HOST, page 17-20. IEEE, (2022)Low-Cost Remarked Counterfeit IC Detection using LDO Regulators., , and . ISCAS, page 1-5. IEEE, (2020)Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-Channel Simulation., , , , , , , , , and 6 other author(s). HOST, page 107-111. IEEE, (2024)Physical security in the post-quantum era., , , , , and . J. Cryptogr. Eng., 12 (3): 267-303 (2022)A stochastic approach to analog physical unclonable function., , , , and . MWSCAS, page 1-4. IEEE, (2016)Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation., , , , and . ITC, page 1-10. IEEE, (2019)Recycled SoC Detection Using LDO Degradation., , and . SN Comput. Sci., 1 (6): 312 (2020)Aging Analysis of Low Dropout Regulator for Universal Recycled IC Detection., , , , and . ISVLSI, page 604-609. IEEE, (2019)Robust, low-cost, and accurate detection of recycled ICs using digital signatures., , , and . HOST, page 209-214. IEEE Computer Society, (2018)Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm., , , and . HOST, page 284-294. IEEE, (2020)