Author of the publication

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †.

, , , , , , , , , , , and . Cryptography, 2 (3): 13 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leaking Information Through Cache LRU States., and . CoRR, (2019)Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security., , , , , , and . CoRR, (2019)Dynamic Physically Unclonable Functions., , , and . ACM Great Lakes Symposium on VLSI, page 311-314. ACM, (2019)Cache timing side-channel vulnerability checking with computation tree logic., , and . HASP@ISCA, page 2:1-2:8. ACM, (2018)Survey of Approaches for Security Verification of Hardware/Software Systems., , , and . IACR Cryptology ePrint Archive, (2016)Spying on Temperature using DRAM., , , , and . DATE, page 13-18. IEEE, (2019)SecNDP: Secure Near-Data Processing with Untrusted Memory., , , , , , , , , and 3 other author(s). IACR Cryptol. ePrint Arch., (2021)Software System Representation Methods Based on Algebraic Component., , , , and . TrustCom/BigDataSE, page 1008-1013. IEEE, (2018)Analysis of Secure Caches and Timing-Based Side-Channel Attacks., , and . IACR Cryptology ePrint Archive, (2019)Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security., , , , , , and . HOST, page 1-7. IEEE Computer Society, (2017)