Zobrazeno 1 - 10
of 237
pro vyhledávání: '"Nabeel, Mohammed"'
Autor:
Bhandari, Jitendra, Chowdhury, Animesh Basak, Nabeel, Mohammed, Sinanoglu, Ozgur, Garg, Siddharth, Karri, Ramesh, Knechtel, Johann
Power side-channel (PSC) analysis is pivotal for securing cryptographic hardware. Prior art focused on securing gate-level netlists obtained as-is from chip design automation, neglecting all the complexities and potential side-effects for security ar
Externí odkaz:
http://arxiv.org/abs/2406.19549
Autor:
Bhandari, Jitendra, Nabeel, Mohammed, Mankali, Likhitha, Sinanoglu, Ozgur, Karri, Ramesh, Knechtel, Johann
This paper presents a novel defense strategy against static power side-channel attacks (PSCAs), a critical threat to cryptographic security. Our method is based on (1) carefully tuning high-Vth versus low-Vth cell selection during synthesis, accounti
Externí odkaz:
http://arxiv.org/abs/2402.03196
Autor:
Soni, Deepraj, Neda, Negar, Zhang, Naifeng, Reynwar, Benedict, Gamil, Homer, Heyman, Benjamin, Nabeel, Mohammed, Badawi, Ahmad Al, Polyakov, Yuriy, Canida, Kellie, Pedram, Massoud, Maniatakos, Michail, Cousins, David Bruce, Franchetti, Franz, French, Matthew, Schmidt, Andrew, Reagen, Brandon
Ring-Learning-with-Errors (RLWE) has emerged as the foundation of many important techniques for improving security and privacy, including homomorphic encryption and post-quantum cryptography. While promising, these techniques have received limited us
Externí odkaz:
http://arxiv.org/abs/2303.17118
Power side-channel (PSC) attacks are well-known threats to sensitive hardware like advanced encryption standard (AES) crypto cores. Given the significant impact of supply voltages (VCCs) on power profiles, various countermeasures based on VCC tuning
Externí odkaz:
http://arxiv.org/abs/2211.08046
Publikováno v:
Array, Vol 22, Iss , Pp 100352- (2024)
Alzheimer’s disease, characterized by progressive and irreversible deterioration of cognitive functions, represents a significant health concern, particularly among older adults, as it stands as the foremost cause of dementia. Despite its debilitat
Externí odkaz:
https://doaj.org/article/bc95154b94314ad9ad9599740fb5caa4
Publikováno v:
Kufa Journal for Veterinary Medical Sciences, Vol 15, Iss 1 (2024)
This study aimed to evaluate the hematoprotective effects of eugenol against iron overload in male rats. A total of 30 rats were randomly divided into six equal groups as follows: the control negative (C-) group I.P injection distal water. The contro
Externí odkaz:
https://doaj.org/article/af9c4ff886264e6c948c66445113ed9f
Publikováno v:
Heliyon, Vol 10, Iss 10, Pp e31158- (2024)
Life satisfaction is a crucial facet of human well-being. Hence, research on life satisfaction is incumbent for understanding how individuals experience their lives and influencing interventions targeted at enhancing mental health and well-being. Lif
Externí odkaz:
https://doaj.org/article/06970c1462a64ac3a36d7328a2355131
Autor:
Nabeel, Mohammed, Gamil, Homer, Soni, Deepraj, Ashraf, Mohammed, Gebremichael, Mizan Abraha, Chielle, Eduardo, Karri, Ramesh, Sanduleanu, Mihai, Maniatakos, Michail
The migration of computation to the cloud has raised concerns regarding the security and privacy of sensitive data, as their need to be decrypted before processing, renders them susceptible to potential breaches. Fully Homomorphic Encryption (FHE) se
Externí odkaz:
http://arxiv.org/abs/2204.08742
Autor:
Md. Sahadul Hasan Arian, Md. Tahmid Ahmed Rakib, Samira Ali, Saif Ahmed, Taseef Hasan Farook, Nabeel Mohammed, James Dudley
Publikováno v:
SN Applied Sciences, Vol 5, Iss 11, Pp 1-16 (2023)
Abstract This study aimed to estimate human age and gender from panoramic radiographs using various deep learning techniques while using explainability to have a novel hybrid unsupervised model explain the decision-making process. The classification
Externí odkaz:
https://doaj.org/article/c97022509a954f5eb1a7c28edcc2be48
Autor:
Nabeel, Mohammed, Ashraf, Mohammed, Patnaik, Satwik, Soteriou, Vassos, Sinanoglu, Ozgur, Knechtel, Johann
Dedicated, after acceptance and publication, in memory of the late Vassos Soteriou. For the first time, we leverage the 2.5D interposer technology to establish system-level security in the face of hardware- and software-centric adversaries. More spec
Externí odkaz:
http://arxiv.org/abs/2009.02412