Author of the publication

The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA.

, , , , , , , and . J. Hardware and Systems Security, 2 (2): 162-178 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bhasin, Shivam
add a person with the name Bhasin, Shivam
 

Other publications of authors with the same name

Time-Frequency Analysis for Second-Order Attacks., , , , , , , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 108-122. Springer, (2013)There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting., , and . ARES, page 54:1-54:10. ACM, (2018)Practical Fault Attack on Deep Neural Networks., , , , , and . ACM Conference on Computer and Communications Security, page 2204-2206. ACM, (2018)SoK: On DFA Vulnerabilities of Substitution-Permutation Networks., , , , , and . AsiaCCS, page 403-414. ACM, (2019)One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis., , , and . DATE, page 1-6. IEEE, (2019)Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers., , , , and . FDTC, page 1-8. IEEE, (2019)A low-entropy first-degree secure provable masking scheme for resource-constrained devices., , , and . WESS, page 7:1-7:10. ACM, (2013)One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers., , , and . FDTC, page 25-32. IEEE Computer Society, (2017)A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20., , , , , , and . FDTC, page 33-40. IEEE Computer Society, (2017)Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology., , , , , and . ES4CPS@DATE, page 13. ACM, (2014)