Author of the publication

Evaluating the security of logic encryption algorithms.

, , and . HOST, page 137-143. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ray, Sayak
add a person with the name Ray, Sayak
 

Other publications of authors with the same name

Template-based Synthesis of Instruction-Level Abstractions for SoC Verification., , , and . FMCAD, page 160-167. IEEE, (2015)NINJA: boolean modelling and formal verification of tiered-rate chemical reaction networks (extended abstract)., , , , , , and . BCB, page 623-624. ACM, (2014)Evaluating the security of logic encryption algorithms., , and . HOST, page 137-143. IEEE Computer Society, (2015)Effective abstraction for response proof of communication fabrics., and . NOCS, page 188-189. IEEE, (2014)A dynamic assertion-based verification platform for validation of UML designs., , , , , and . ACM SIGSOFT Software Engineering Notes, 37 (1): 1-14 (2012)Scalable progress verification in credit-based flow-control systems., and . DATE, page 905-910. IEEE, (2012)Mapping into LUT structures., , , , , and . DATE, page 1579-1584. IEEE, (2012)Ranking structure in communication fabrics., and . MEMOCODE, page 65-74. IEEE, (2013)Verification of Authenticated Firmware Loaders., , and . FMCAD, page 110-119. IEEE, (2019)A Dynamic Assertion-Based Verification Platform for Validation of UML Designs., , , , , and . ATVA, volume 5311 of Lecture Notes in Computer Science, page 222-227. Springer, (2008)