default search action
BibTeX records: Amitabh Das
@article{DBLP:journals/tc/AikataMJDMGR23, author = {Aikata and Ahmet Can Mert and David Jacquemin and Amitabh Das and Donald Matthews and Santosh Ghosh and Sujoy Sinha Roy}, title = {A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {6}, pages = {1568--1580}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3215064}, doi = {10.1109/TC.2022.3215064}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/AikataMJDMGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ZhouCDMYZZ22, author = {Lixi Zhou and Jiaqing Chen and Amitabh Das and Hong Min and Lei Yu and Ming Zhao and Jia Zou}, title = {Serving Deep Learning Models with Deduplication from Relational Databases}, journal = {Proc. {VLDB} Endow.}, volume = {15}, number = {10}, pages = {2230--2243}, year = {2022}, url = {https://www.vldb.org/pvldb/vol15/p2230-zou.pdf}, doi = {10.14778/3547305.3547325}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ZhouCDMYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/BhuniaDFKKR022, author = {Swarup Bhunia and Amitabh Das and Saverio Fazzari and Vivian Kammler and David Kehlet and Jeyavijayan Rajendran and Ankur Srivastava}, editor = {Tulika Mitra and Evangeline F. Y. Young and Jinjun Xiong}, title = {Hardware {IP} Protection against Confidentiality Attacks and Evolving Role of {CAD} Tool}, booktitle = {Proceedings of the 41st {IEEE/ACM} International Conference on Computer-Aided Design, {ICCAD} 2022, San Diego, California, USA, 30 October 2022 - 3 November 2022}, pages = {25:1--25:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508352.3561103}, doi = {10.1145/3508352.3561103}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccad/BhuniaDFKKR022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssdbm/ZhouJWDY022, author = {Lixi Zhou and Arindam Jain and Zijie Wang and Amitabh Das and Yingzhen Yang and Jia Zou}, editor = {Elaheh Pourabbas and Yongluan Zhou and Yuchen Li and Bin Yang}, title = {Benchmark of {DNN} Model Search at Deployment Time}, booktitle = {{SSDBM} 2022: 34th International Conference on Scientific and Statistical Database Management, Copenhagen, Denmark, July 6 - 8, 2022}, pages = {10:1--10:12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538712.3538725}, doi = {10.1145/3538712.3538725}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssdbm/ZhouJWDY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10442, author = {Lixi Zhou and Jiaqing Chen and Amitabh Das and Hong Min and Lei Yu and Ming Zhao and Jia Zou}, title = {Serving Deep Learning Models with Deduplication from Relational Databases}, journal = {CoRR}, volume = {abs/2201.10442}, year = {2022}, url = {https://arxiv.org/abs/2201.10442}, eprinttype = {arXiv}, eprint = {2201.10442}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10442.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-00188, author = {Lixi Zhou and Arindam Jain and Zijie Wang and Amitabh Das and Yingzhen Yang and Jia Zou}, title = {Benchmark of {DNN} Model Search at Deployment Time}, journal = {CoRR}, volume = {abs/2206.00188}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.00188}, doi = {10.48550/ARXIV.2206.00188}, eprinttype = {arXiv}, eprint = {2206.00188}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-00188.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07412, author = {Aikata and Ahmet Can Mert and David Jacquemin and Amitabh Das and Donald Matthews and Santosh Ghosh and Sujoy Sinha Roy}, title = {A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange}, journal = {CoRR}, volume = {abs/2210.07412}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07412}, doi = {10.48550/ARXIV.2210.07412}, eprinttype = {arXiv}, eprint = {2210.07412}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ZouDBIYJJ21, author = {Jia Zou and Amitabh Das and Pratik Barhate and Arun Iyengar and Binhang Yuan and Dimitrije Jankov and Chris Jermaine}, title = {Lachesis: Automated Partitioning for UDF-Centric Analytics}, journal = {Proc. {VLDB} Endow.}, volume = {14}, number = {8}, pages = {1262--1275}, year = {2021}, url = {http://www.vldb.org/pvldb/vol14/p1262-zou.pdf}, doi = {10.14778/3457390.3457392}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ZouDBIYJJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/TalukdarCDASC21, author = {Jonti Talukdar and Siyuan Chen and Amitabh Das and Sohrab Aftabjahani and Peilin Song and Krishnendu Chakrabarty}, title = {A BIST-based Dynamic Obfuscation Scheme for Resilience against Removal and Oracle-guided Attacks\({}^{\mbox{*}}\)}, booktitle = {{IEEE} International Test Conference, {ITC} 2021, Anaheim, CA, USA, October 10-15, 2021}, pages = {170--179}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ITC50571.2021.00025}, doi = {10.1109/ITC50571.2021.00025}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itc/TalukdarCDASC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AikataMJDMGR21, author = {Aikata and Ahmet Can Mert and David Jacquemin and Amitabh Das and Donald Matthews and Santosh Ghosh and Sujoy Sinha Roy}, title = {A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1461}, year = {2021}, url = {https://eprint.iacr.org/2021/1461}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AikataMJDMGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/MukherjeeGKDPC20, author = {Rijoy Mukherjee and Vidya Govindan and Sandhya Koteshwara and Amitabh Das and Keshab K. Parhi and Rajat Subhra Chakraborty}, title = {Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure}, journal = {J. Hardw. Syst. Secur.}, volume = {4}, number = {4}, pages = {343--360}, year = {2020}, url = {https://doi.org/10.1007/s41635-020-00107-9}, doi = {10.1007/S41635-020-00107-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/MukherjeeGKDPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-16529, author = {Jia Zou and Pratik Barhate and Amitabh Das and Arun Iyengar and Binhang Yuan and Dimitrije Jankov and Chris Jermaine}, title = {Lachesis: Automated Generation of Persistent Partitionings for Big Data Applications}, journal = {CoRR}, volume = {abs/2006.16529}, year = {2020}, url = {https://arxiv.org/abs/2006.16529}, eprinttype = {arXiv}, eprint = {2006.16529}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-16529.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-07586, author = {Zijie Wang and Lixi Zhou and Amitabh Das and Valay Dave and Zhanpeng Jin and Jia Zou}, title = {Survive the Schema Changes: Integration of Unmanaged Data Using Deep Learning}, journal = {CoRR}, volume = {abs/2010.07586}, year = {2020}, url = {https://arxiv.org/abs/2010.07586}, eprinttype = {arXiv}, eprint = {2010.07586}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-07586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-09474, author = {Lixi Zhou and Zijie Wang and Amitabh Das and Jia Zou}, title = {It's the Best Only When It Fits You Most: Finding Related Models for Serving Based on Dynamic Locality Sensitive Hashing}, journal = {CoRR}, volume = {abs/2010.09474}, year = {2020}, url = {https://arxiv.org/abs/2010.09474}, eprinttype = {arXiv}, eprint = {2010.09474}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-09474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/KoteshwaraDP19, author = {Sandhya Koteshwara and Amitabh Das and Keshab K. Parhi}, title = {Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {27}, number = {5}, pages = {1053--1066}, year = {2019}, url = {https://doi.org/10.1109/TVLSI.2019.2894656}, doi = {10.1109/TVLSI.2019.2894656}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/KoteshwaraDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/KhatamifardWDKK19, author = {S. Karen Khatamifard and Longfei Wang and Amitabh Das and Sel{\c{c}}uk K{\"{o}}se and Ulya R. Karpuzcu}, title = {{POWERT} Channels: {A} Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities}, booktitle = {25th {IEEE} International Symposium on High Performance Computer Architecture, {HPCA} 2019, Washington, DC, USA, February 16-20, 2019}, pages = {291--303}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCA.2019.00045}, doi = {10.1109/HPCA.2019.00045}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpca/KhatamifardWDKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/GovindanKDPC19, author = {Vidya Govindan and Sandhya Koteshwara and Amitabh Das and Keshab K. Parhi and Rajat Subhra Chakraborty}, editor = {Shivam Bhasin and Avi Mendelson and Mridul Nandi}, title = {ProTro: {A} Probabilistic Counter Based Hardware Trojan Attack on {FPGA} Based MACSec Enabled Ethernet Switch}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11947}, pages = {159--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35869-3\_12}, doi = {10.1007/978-3-030-35869-3\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/GovindanKDPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KounavisDDPD18, author = {Michael E. Kounavis and David Durham and Sergej Deutsch and Antonios Papadimitriou and Amitabh Das}, title = {Cryptographic Constructions Supporting Implicit Data Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2018}, url = {https://eprint.iacr.org/2018/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KounavisDDPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/KoteshwaraD17, author = {Sandhya Koteshwara and Amitabh Das}, title = {Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications}, journal = {{IEEE} Des. Test}, volume = {34}, number = {4}, pages = {26--33}, year = {2017}, url = {https://doi.org/10.1109/MDAT.2017.2682234}, doi = {10.1109/MDAT.2017.2682234}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dt/KoteshwaraD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/KoteshwaraDP17, author = {Sandhya Koteshwara and Amitabh Das and Keshab K. Parhi}, editor = {Michael B. Matthews}, title = {Performance comparison of {AES-GCM-SIV} and {AES-GCM} algorithms for authenticated encryption on {FPGA} platforms}, booktitle = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2017, Pacific Grove, CA, USA, October 29 - November 1, 2017}, pages = {1331--1336}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ACSSC.2017.8335570}, doi = {10.1109/ACSSC.2017.8335570}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acssc/KoteshwaraDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KoteshwaraDP17, author = {Sandhya Koteshwara and Amitabh Das and Keshab K. Parhi}, title = {{FPGA} implementation and comparison of {AES-GCM} and Deoxys authenticated encryption schemes}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2017, Baltimore, MD, USA, May 28-31, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCAS.2017.8050315}, doi = {10.1109/ISCAS.2017.8050315}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KoteshwaraDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/AftabjahaniD17, author = {Seyed{-}Abdollah Aftabjahani and Amitabh Das}, title = {Robust secure design by increasing the resilience of Attack Protection Blocks}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {13--18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031538}, doi = {10.1109/IVSW.2017.8031538}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/AftabjahaniD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshKDV15, author = {Santosh Ghosh and Amit Kumar and Amitabh Das and Ingrid Verbauwhede}, title = {On the Implementation of Unified Arithmetic on Binary Huff Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2015}, url = {http://eprint.iacr.org/2015/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshKDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/DaRoltDNFRV14, author = {Jean DaRolt and Amitabh Das and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede}, title = {Test Versus Security: Past and Present}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {2}, number = {1}, pages = {50--62}, year = {2014}, url = {https://doi.org/10.1109/TETC.2014.2304492}, doi = {10.1109/TETC.2014.2304492}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/DaRoltDNFRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasKV14, author = {Amitabh Das and Dusko Karaklajic and Ingrid Verbauwhede}, title = {Secure Mutual Testing Strategy for Cryptographic SoCs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2014}, url = {http://eprint.iacr.org/2014/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Das13, author = {Amitabh Das}, title = {Differential Scan-Based Side-Channel Attacks and Countermeasures (Differenti{\"{e}}le scan-gebaseerde nevenkanaalaanvallen en tegenmaatregelen)}, school = {Katholieke Universiteit Leuven, Belgium}, year = {2013}, url = {https://lirias.kuleuven.be/handle/123456789/414988}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Das13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/DasDGSDNFRV13, author = {Amitabh Das and Jean DaRolt and Santosh Ghosh and Stefaan Seys and Sophie Dupuis and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede}, title = {Secure {JTAG} Implementation Using Schnorr Protocol}, journal = {J. Electron. Test.}, volume = {29}, number = {2}, pages = {193--209}, year = {2013}, url = {https://doi.org/10.1007/s10836-013-5369-9}, doi = {10.1007/S10836-013-5369-9}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/DasDGSDNFRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/DasEGBV13, author = {Amitabh Das and Baris Ege and Santosh Ghosh and Lejla Batina and Ingrid Verbauwhede}, title = {Security Analysis of Industrial Test Compression Schemes}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {32}, number = {12}, pages = {1966--1977}, year = {2013}, url = {https://doi.org/10.1109/TCAD.2013.2274619}, doi = {10.1109/TCAD.2013.2274619}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/DasEGBV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/te/UhsadelUDKBVD13, author = {Leif Uhsadel and Markus Ullrich and Amitabh Das and Dusko Karaklajic and Josep Balasch and Ingrid Verbauwhede and Wim Dehaene}, title = {Teaching {HW/SW} Co-Design With a Public Key Cryptography Application}, journal = {{IEEE} Trans. Educ.}, volume = {56}, number = {4}, pages = {478--483}, year = {2013}, url = {https://doi.org/10.1109/TE.2013.2257785}, doi = {10.1109/TE.2013.2257785}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/te/UhsadelUDKBVD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GhoshKDV13, author = {Santosh Ghosh and Amit Kumar and Amitabh Das and Ingrid Verbauwhede}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {On the Implementation of Unified Arithmetic on Binary Huff Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {349--364}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_20}, doi = {10.1007/978-3-642-40349-1\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GhoshKDV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BatinaDEKMPVY13, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yal{\c{c}}in}, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, pages = {103--112}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2\_7}, doi = {10.1007/978-3-642-41332-2\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rfidsec/BatinaDEKMPVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaDEKMPVY13, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yal{\c{c}}in}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2013}, url = {http://eprint.iacr.org/2013/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaDEKMPVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DaRoltDGNFRV12, author = {Jean DaRolt and Amitabh Das and Santosh Ghosh and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede}, title = {Scan attacks on side-channel and fault attack resistant public-key implementations}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {4}, pages = {207--219}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0045-z}, doi = {10.1007/S13389-012-0045-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DaRoltDGNFRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DaRoltDNFRV12, author = {Jean DaRolt and Amitabh Das and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede}, editor = {Werner Schindler and Sorin A. Huss}, title = {A New Scan Attack on {RSA} in Presence of Industrial Countermeasures}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {89--104}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_8}, doi = {10.1007/978-3-642-29912-4\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DaRoltDNFRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/DasKSV12, author = {Amitabh Das and {\"{U}}nal Ko{\c{c}}abas and Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede}, editor = {Wolfgang Rosenstiel and Lothar Thiele}, title = {PUF-based secure test wrapper design for cryptographic SoC testing}, booktitle = {2012 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012}, pages = {866--869}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DATE.2012.6176618}, doi = {10.1109/DATE.2012.6176618}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/DasKSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/DaRoltDNFRV12, author = {Jean DaRolt and Amitabh Das and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede}, title = {A scan-based attack on Elliptic Curve Cryptosystems in presence of industrial Design-for-Testability structures}, booktitle = {2012 {IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2012, Austin, TX, USA, October 3-5, 2012}, pages = {43--48}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DFT.2012.6378197}, doi = {10.1109/DFT.2012.6378197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/DaRoltDNFRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/EgeDGV12, author = {Baris Ege and Amitabh Das and Santosh Ghosh and Ingrid Verbauwhede}, title = {Differential Scan Attack on {AES} with X-tolerant and X-masked Test Response Compactor}, booktitle = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme, Izmir, Turkey, September 5-8, 2012}, pages = {545--552}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSD.2012.44}, doi = {10.1109/DSD.2012.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/EgeDGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.