Author of the publication

Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach.

, , , , , , , and . HOST, page 13-18. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP., and . HOST, page 96-99. IEEE Computer Society, (2009)Model building attacks on Physically Unclonable Functions using genetic programming., , and . HOST, page 41-44. IEEE Computer Society, (2013)Design of low area-overhead ring oscillator PUF with large challenge space., , and . ReConFig, page 1-6. IEEE, (2013)Micropipeline-Based Asynchronous Design Methodology for Robust System Design Using Nanoscale Crossbar., and . ISQED, page 697-701. IEEE Computer Society, (2008)A Technique to Evaluate Upper Bounds on Performance of Pixel-prediction Based Reversible Watermarking Algorithms., and . Signal Processing Systems, 82 (3): 373-389 (2016)Hardware Security - Design, Threats, and Safeguards., and . CRC Press, (2014)A generalized tamper localization approach for reversible watermarking algorithms., and . TOMCCAP, 9 (3): 19:1-19:22 (2013)A study of asynchronous design methodology for robust CMOS-nano hybrid system design., and . JETC, 5 (3): 12:1-12:22 (2009)A PUF-based Secure Communication Protocol for IoT., , and . IACR Cryptology ePrint Archive, (2016)A Fabric Component Based Approach to the Architecture and Design Automation of High-Performance Integer Arithmetic Circuits on FPGA., and . Computational Intelligence in Digital and Network Designs and Applications, Springer, (2015)