BibTeX records: Amitabh Das

download as .bib file

@article{DBLP:journals/tc/AikataMJDMGR23,
  author       = {Aikata and
                  Ahmet Can Mert and
                  David Jacquemin and
                  Amitabh Das and
                  Donald Matthews and
                  Santosh Ghosh and
                  Sujoy Sinha Roy},
  title        = {A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {6},
  pages        = {1568--1580},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3215064},
  doi          = {10.1109/TC.2022.3215064},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/AikataMJDMGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ZhouCDMYZZ22,
  author       = {Lixi Zhou and
                  Jiaqing Chen and
                  Amitabh Das and
                  Hong Min and
                  Lei Yu and
                  Ming Zhao and
                  Jia Zou},
  title        = {Serving Deep Learning Models with Deduplication from Relational Databases},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {15},
  number       = {10},
  pages        = {2230--2243},
  year         = {2022},
  url          = {https://www.vldb.org/pvldb/vol15/p2230-zou.pdf},
  doi          = {10.14778/3547305.3547325},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ZhouCDMYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/BhuniaDFKKR022,
  author       = {Swarup Bhunia and
                  Amitabh Das and
                  Saverio Fazzari and
                  Vivian Kammler and
                  David Kehlet and
                  Jeyavijayan Rajendran and
                  Ankur Srivastava},
  editor       = {Tulika Mitra and
                  Evangeline F. Y. Young and
                  Jinjun Xiong},
  title        = {Hardware {IP} Protection against Confidentiality Attacks and Evolving
                  Role of {CAD} Tool},
  booktitle    = {Proceedings of the 41st {IEEE/ACM} International Conference on Computer-Aided
                  Design, {ICCAD} 2022, San Diego, California, USA, 30 October 2022
                  - 3 November 2022},
  pages        = {25:1--25:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508352.3561103},
  doi          = {10.1145/3508352.3561103},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/BhuniaDFKKR022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssdbm/ZhouJWDY022,
  author       = {Lixi Zhou and
                  Arindam Jain and
                  Zijie Wang and
                  Amitabh Das and
                  Yingzhen Yang and
                  Jia Zou},
  editor       = {Elaheh Pourabbas and
                  Yongluan Zhou and
                  Yuchen Li and
                  Bin Yang},
  title        = {Benchmark of {DNN} Model Search at Deployment Time},
  booktitle    = {{SSDBM} 2022: 34th International Conference on Scientific and Statistical
                  Database Management, Copenhagen, Denmark, July 6 - 8, 2022},
  pages        = {10:1--10:12},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538712.3538725},
  doi          = {10.1145/3538712.3538725},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssdbm/ZhouJWDY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-10442,
  author       = {Lixi Zhou and
                  Jiaqing Chen and
                  Amitabh Das and
                  Hong Min and
                  Lei Yu and
                  Ming Zhao and
                  Jia Zou},
  title        = {Serving Deep Learning Models with Deduplication from Relational Databases},
  journal      = {CoRR},
  volume       = {abs/2201.10442},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.10442},
  eprinttype    = {arXiv},
  eprint       = {2201.10442},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-10442.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-00188,
  author       = {Lixi Zhou and
                  Arindam Jain and
                  Zijie Wang and
                  Amitabh Das and
                  Yingzhen Yang and
                  Jia Zou},
  title        = {Benchmark of {DNN} Model Search at Deployment Time},
  journal      = {CoRR},
  volume       = {abs/2206.00188},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.00188},
  doi          = {10.48550/ARXIV.2206.00188},
  eprinttype    = {arXiv},
  eprint       = {2206.00188},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-00188.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07412,
  author       = {Aikata and
                  Ahmet Can Mert and
                  David Jacquemin and
                  Amitabh Das and
                  Donald Matthews and
                  Santosh Ghosh and
                  Sujoy Sinha Roy},
  title        = {A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange},
  journal      = {CoRR},
  volume       = {abs/2210.07412},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07412},
  doi          = {10.48550/ARXIV.2210.07412},
  eprinttype    = {arXiv},
  eprint       = {2210.07412},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07412.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ZouDBIYJJ21,
  author       = {Jia Zou and
                  Amitabh Das and
                  Pratik Barhate and
                  Arun Iyengar and
                  Binhang Yuan and
                  Dimitrije Jankov and
                  Chris Jermaine},
  title        = {Lachesis: Automated Partitioning for UDF-Centric Analytics},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {14},
  number       = {8},
  pages        = {1262--1275},
  year         = {2021},
  url          = {http://www.vldb.org/pvldb/vol14/p1262-zou.pdf},
  doi          = {10.14778/3457390.3457392},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ZouDBIYJJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/TalukdarCDASC21,
  author       = {Jonti Talukdar and
                  Siyuan Chen and
                  Amitabh Das and
                  Sohrab Aftabjahani and
                  Peilin Song and
                  Krishnendu Chakrabarty},
  title        = {A BIST-based Dynamic Obfuscation Scheme for Resilience against Removal
                  and Oracle-guided Attacks\({}^{\mbox{*}}\)},
  booktitle    = {{IEEE} International Test Conference, {ITC} 2021, Anaheim, CA, USA,
                  October 10-15, 2021},
  pages        = {170--179},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ITC50571.2021.00025},
  doi          = {10.1109/ITC50571.2021.00025},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itc/TalukdarCDASC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AikataMJDMGR21,
  author       = {Aikata and
                  Ahmet Can Mert and
                  David Jacquemin and
                  Amitabh Das and
                  Donald Matthews and
                  Santosh Ghosh and
                  Sujoy Sinha Roy},
  title        = {A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1461},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1461},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AikataMJDMGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/MukherjeeGKDPC20,
  author       = {Rijoy Mukherjee and
                  Vidya Govindan and
                  Sandhya Koteshwara and
                  Amitabh Das and
                  Keshab K. Parhi and
                  Rajat Subhra Chakraborty},
  title        = {Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable
                  Network Infrastructure},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {343--360},
  year         = {2020},
  url          = {https://doi.org/10.1007/s41635-020-00107-9},
  doi          = {10.1007/S41635-020-00107-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/MukherjeeGKDPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-16529,
  author       = {Jia Zou and
                  Pratik Barhate and
                  Amitabh Das and
                  Arun Iyengar and
                  Binhang Yuan and
                  Dimitrije Jankov and
                  Chris Jermaine},
  title        = {Lachesis: Automated Generation of Persistent Partitionings for Big
                  Data Applications},
  journal      = {CoRR},
  volume       = {abs/2006.16529},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.16529},
  eprinttype    = {arXiv},
  eprint       = {2006.16529},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-16529.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-07586,
  author       = {Zijie Wang and
                  Lixi Zhou and
                  Amitabh Das and
                  Valay Dave and
                  Zhanpeng Jin and
                  Jia Zou},
  title        = {Survive the Schema Changes: Integration of Unmanaged Data Using Deep
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2010.07586},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.07586},
  eprinttype    = {arXiv},
  eprint       = {2010.07586},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-07586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-09474,
  author       = {Lixi Zhou and
                  Zijie Wang and
                  Amitabh Das and
                  Jia Zou},
  title        = {It's the Best Only When It Fits You Most: Finding Related Models for
                  Serving Based on Dynamic Locality Sensitive Hashing},
  journal      = {CoRR},
  volume       = {abs/2010.09474},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.09474},
  eprinttype    = {arXiv},
  eprint       = {2010.09474},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-09474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/KoteshwaraDP19,
  author       = {Sandhya Koteshwara and
                  Amitabh Das and
                  Keshab K. Parhi},
  title        = {Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant
                  Authenticated Encryption Algorithms},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {27},
  number       = {5},
  pages        = {1053--1066},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVLSI.2019.2894656},
  doi          = {10.1109/TVLSI.2019.2894656},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/KoteshwaraDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/KhatamifardWDKK19,
  author       = {S. Karen Khatamifard and
                  Longfei Wang and
                  Amitabh Das and
                  Sel{\c{c}}uk K{\"{o}}se and
                  Ulya R. Karpuzcu},
  title        = {{POWERT} Channels: {A} Novel Class of Covert CommunicationExploiting
                  Power Management Vulnerabilities},
  booktitle    = {25th {IEEE} International Symposium on High Performance Computer Architecture,
                  {HPCA} 2019, Washington, DC, USA, February 16-20, 2019},
  pages        = {291--303},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCA.2019.00045},
  doi          = {10.1109/HPCA.2019.00045},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpca/KhatamifardWDKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/GovindanKDPC19,
  author       = {Vidya Govindan and
                  Sandhya Koteshwara and
                  Amitabh Das and
                  Keshab K. Parhi and
                  Rajat Subhra Chakraborty},
  editor       = {Shivam Bhasin and
                  Avi Mendelson and
                  Mridul Nandi},
  title        = {ProTro: {A} Probabilistic Counter Based Hardware Trojan Attack on
                  {FPGA} Based MACSec Enabled Ethernet Switch},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 9th International
                  Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11947},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35869-3\_12},
  doi          = {10.1007/978-3-030-35869-3\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/GovindanKDPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KounavisDDPD18,
  author       = {Michael E. Kounavis and
                  David Durham and
                  Sergej Deutsch and
                  Antonios Papadimitriou and
                  Amitabh Das},
  title        = {Cryptographic Constructions Supporting Implicit Data Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KounavisDDPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/KoteshwaraD17,
  author       = {Sandhya Koteshwara and
                  Amitabh Das},
  title        = {Comparative Study of Authenticated Encryption Targeting Lightweight
                  IoT Applications},
  journal      = {{IEEE} Des. Test},
  volume       = {34},
  number       = {4},
  pages        = {26--33},
  year         = {2017},
  url          = {https://doi.org/10.1109/MDAT.2017.2682234},
  doi          = {10.1109/MDAT.2017.2682234},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dt/KoteshwaraD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/KoteshwaraDP17,
  author       = {Sandhya Koteshwara and
                  Amitabh Das and
                  Keshab K. Parhi},
  editor       = {Michael B. Matthews},
  title        = {Performance comparison of {AES-GCM-SIV} and {AES-GCM} algorithms for
                  authenticated encryption on {FPGA} platforms},
  booktitle    = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2017, Pacific Grove, CA, USA, October 29 - November 1, 2017},
  pages        = {1331--1336},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACSSC.2017.8335570},
  doi          = {10.1109/ACSSC.2017.8335570},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/KoteshwaraDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KoteshwaraDP17,
  author       = {Sandhya Koteshwara and
                  Amitabh Das and
                  Keshab K. Parhi},
  title        = {{FPGA} implementation and comparison of {AES-GCM} and Deoxys authenticated
                  encryption schemes},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2017,
                  Baltimore, MD, USA, May 28-31, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCAS.2017.8050315},
  doi          = {10.1109/ISCAS.2017.8050315},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KoteshwaraDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/AftabjahaniD17,
  author       = {Seyed{-}Abdollah Aftabjahani and
                  Amitabh Das},
  title        = {Robust secure design by increasing the resilience of Attack Protection
                  Blocks},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031538},
  doi          = {10.1109/IVSW.2017.8031538},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/AftabjahaniD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshKDV15,
  author       = {Santosh Ghosh and
                  Amit Kumar and
                  Amitabh Das and
                  Ingrid Verbauwhede},
  title        = {On the Implementation of Unified Arithmetic on Binary Huff Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshKDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/DaRoltDNFRV14,
  author       = {Jean DaRolt and
                  Amitabh Das and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre and
                  Ingrid Verbauwhede},
  title        = {Test Versus Security: Past and Present},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {50--62},
  year         = {2014},
  url          = {https://doi.org/10.1109/TETC.2014.2304492},
  doi          = {10.1109/TETC.2014.2304492},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/DaRoltDNFRV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasKV14,
  author       = {Amitabh Das and
                  Dusko Karaklajic and
                  Ingrid Verbauwhede},
  title        = {Secure Mutual Testing Strategy for Cryptographic SoCs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Das13,
  author       = {Amitabh Das},
  title        = {Differential Scan-Based Side-Channel Attacks and Countermeasures (Differenti{\"{e}}le
                  scan-gebaseerde nevenkanaalaanvallen en tegenmaatregelen)},
  school       = {Katholieke Universiteit Leuven, Belgium},
  year         = {2013},
  url          = {https://lirias.kuleuven.be/handle/123456789/414988},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Das13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/DasDGSDNFRV13,
  author       = {Amitabh Das and
                  Jean DaRolt and
                  Santosh Ghosh and
                  Stefaan Seys and
                  Sophie Dupuis and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre and
                  Ingrid Verbauwhede},
  title        = {Secure {JTAG} Implementation Using Schnorr Protocol},
  journal      = {J. Electron. Test.},
  volume       = {29},
  number       = {2},
  pages        = {193--209},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10836-013-5369-9},
  doi          = {10.1007/S10836-013-5369-9},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/DasDGSDNFRV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/DasEGBV13,
  author       = {Amitabh Das and
                  Baris Ege and
                  Santosh Ghosh and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Security Analysis of Industrial Test Compression Schemes},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {32},
  number       = {12},
  pages        = {1966--1977},
  year         = {2013},
  url          = {https://doi.org/10.1109/TCAD.2013.2274619},
  doi          = {10.1109/TCAD.2013.2274619},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/DasEGBV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/te/UhsadelUDKBVD13,
  author       = {Leif Uhsadel and
                  Markus Ullrich and
                  Amitabh Das and
                  Dusko Karaklajic and
                  Josep Balasch and
                  Ingrid Verbauwhede and
                  Wim Dehaene},
  title        = {Teaching {HW/SW} Co-Design With a Public Key Cryptography Application},
  journal      = {{IEEE} Trans. Educ.},
  volume       = {56},
  number       = {4},
  pages        = {478--483},
  year         = {2013},
  url          = {https://doi.org/10.1109/TE.2013.2257785},
  doi          = {10.1109/TE.2013.2257785},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/te/UhsadelUDKBVD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GhoshKDV13,
  author       = {Santosh Ghosh and
                  Amit Kumar and
                  Amitabh Das and
                  Ingrid Verbauwhede},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Implementation of Unified Arithmetic on Binary Huff Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_20},
  doi          = {10.1007/978-3-642-40349-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GhoshKDV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BatinaDEKMPVY13,
  author       = {Lejla Batina and
                  Amitabh Das and
                  Baris Ege and
                  Elif Bilge Kavun and
                  Nele Mentens and
                  Christof Paar and
                  Ingrid Verbauwhede and
                  Tolga Yal{\c{c}}in},
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy
                  and Area Analysis of Recently Developed Architectures},
  booktitle    = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  pages        = {103--112},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2\_7},
  doi          = {10.1007/978-3-642-41332-2\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BatinaDEKMPVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaDEKMPVY13,
  author       = {Lejla Batina and
                  Amitabh Das and
                  Baris Ege and
                  Elif Bilge Kavun and
                  Nele Mentens and
                  Christof Paar and
                  Ingrid Verbauwhede and
                  Tolga Yal{\c{c}}in},
  title        = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy
                  and Area Analysis of Recently Developed Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaDEKMPVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DaRoltDGNFRV12,
  author       = {Jean DaRolt and
                  Amitabh Das and
                  Santosh Ghosh and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre and
                  Ingrid Verbauwhede},
  title        = {Scan attacks on side-channel and fault attack resistant public-key
                  implementations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {4},
  pages        = {207--219},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0045-z},
  doi          = {10.1007/S13389-012-0045-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DaRoltDGNFRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DaRoltDNFRV12,
  author       = {Jean DaRolt and
                  Amitabh Das and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre and
                  Ingrid Verbauwhede},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {A New Scan Attack on {RSA} in Presence of Industrial Countermeasures},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {89--104},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_8},
  doi          = {10.1007/978-3-642-29912-4\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DaRoltDNFRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/DasKSV12,
  author       = {Amitabh Das and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Ahmad{-}Reza Sadeghi and
                  Ingrid Verbauwhede},
  editor       = {Wolfgang Rosenstiel and
                  Lothar Thiele},
  title        = {PUF-based secure test wrapper design for cryptographic SoC testing},
  booktitle    = {2012 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012},
  pages        = {866--869},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/DATE.2012.6176618},
  doi          = {10.1109/DATE.2012.6176618},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/DasKSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/DaRoltDNFRV12,
  author       = {Jean DaRolt and
                  Amitabh Das and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre and
                  Ingrid Verbauwhede},
  title        = {A scan-based attack on Elliptic Curve Cryptosystems in presence of
                  industrial Design-for-Testability structures},
  booktitle    = {2012 {IEEE} International Symposium on Defect and Fault Tolerance
                  in {VLSI} and Nanotechnology Systems, {DFT} 2012, Austin, TX, USA,
                  October 3-5, 2012},
  pages        = {43--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DFT.2012.6378197},
  doi          = {10.1109/DFT.2012.6378197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/DaRoltDNFRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/EgeDGV12,
  author       = {Baris Ege and
                  Amitabh Das and
                  Santosh Ghosh and
                  Ingrid Verbauwhede},
  title        = {Differential Scan Attack on {AES} with X-tolerant and X-masked Test
                  Response Compactor},
  booktitle    = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme,
                  Izmir, Turkey, September 5-8, 2012},
  pages        = {545--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSD.2012.44},
  doi          = {10.1109/DSD.2012.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/EgeDGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}