Author of the publication

Towards Secure Analog Designs: A Secure Sense Amplifier Using Memristors.

, , and . ISVLSI, page 516-521. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rajendran, Jeyavijayan
add a person with the name Rajendran, Jeyavijayan
 

Other publications of authors with the same name

Blue team red team approach to hardware trust assessment., , and . ICCD, page 285-288. IEEE Computer Society, (2011)Hot topic session 9C: Test and fault tolerance for emerging memory technologies., , and . VTS, page 1. IEEE Computer Society, (2014)Hardware-based attacks to compromise the cryptographic security of an election system., , , , and . ICCD, page 153-156. IEEE Computer Society, (2016)Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging., , and . IACR Cryptology ePrint Archive, (2016)Removal Attacks on Logic Locking and Camouflaging Techniques., , , and . IACR Cryptology ePrint Archive, (2017)Security analysis of integrated circuit camouflaging., , , and . ACM Conference on Computer and Communications Security, page 709-720. ACM, (2013)An Approach to Tolerate Process Related Variations in Memristor-Based Applications., , , and . VLSI Design, page 18-23. IEEE Computer Society, (2011)Parallel memristors: Improving variation tolerance in memristive digital circuits., , and . ISCAS, page 2241-2244. IEEE, (2011)Belling the CAD: Toward Security-Centric Electronic System Design., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (11): 1756-1769 (2015)Engineering crossbar based emerging memory technologies., , , and . ICCD, page 478-479. IEEE Computer Society, (2012)