From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing Hardware Security with Emerging Transistor Technologies., , , , , и . ACM Great Lakes Symposium on VLSI, стр. 305-310. ACM, (2016)Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures., , , и . ACM Great Lakes Symposium on VLSI, стр. 147-152. ACM, (2018)On the Impossibility of Approximation-Resilient Circuit Locking., , и . HOST, стр. 161-170. IEEE, (2019)A Security Analysis of Circuit Clock Obfuscation., , , и . Cryptogr., 6 (3): 43 (2022)Cyclic Obfuscation for Creating SAT-Unresolvable Circuits., , , , , и . ACM Great Lakes Symposium on VLSI, стр. 173-178. ACM, (2017)Emerging Technology-Based Design of Primitives for Hardware Security., , , , , , , , и . ACM J. Emerg. Technol. Comput. Syst., 13 (1): 3:1-3:19 (2016)Enhancing Solver-based Generic Side-Channel Analysis with Machine Learning., и . ACM Great Lakes Symposium on VLSI, стр. 345-350. ACM, (2023)IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits., , и . ICCAD, стр. 1-7. ACM, (2019)Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail?, , , , , и . ACM Great Lakes Symposium on VLSI, стр. 357-362. ACM, (2017)Hardware Security Challenges Beyond CMOS: Attacks and Remedies., , и . ISVLSI, стр. 200-205. IEEE Computer Society, (2016)