Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Patanjali SLPSK"'
Publikováno v:
IEEE Transactions on Computers. 72:1763-1777
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. :1-11
Publikováno v:
IEEE Transactions on Computers. :1-14
Publikováno v:
IEEE Internet of Things Journal. 9:24615-24627
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 29:149-161
Counterfeit integrated circuits (ICs) have become a significant security concern in the semiconductor industry as a result of the increasingly complex and distributed nature of the supply chain. These counterfeit chips may result in performance degra
Publikováno v:
IEEE Consumer Electronics Magazine. 9:72-83
The semiconductor industry is constantly striving to improve the performance, reliability, and cost of electronic devices. The growing complexity in the design process of microelectronics coupled with the requirement of significant investment in rese
Publikováno v:
IEEE Computer Architecture Letters. 19:9-12
Cache timing attacks are a serious threat to the security of computing systems. It permits sensitive information, such as cryptographic keys, to leak across virtual machines and even to remote servers. Encrypted Address Cache, proposed by CEASER –
Publikováno v:
ISQED
The challenges of custom integrated circuits (IC) design have made it prevalent to integrate commercial-off-the-shelf (COTS) components (micro-controllers, FPGAs, etc.) in today’s designs. While this approach eases the design challenges and improve
Publikováno v:
ACM Great Lakes Symposium on VLSI
Commercial off-the-shelf (COTS) components, such as microcontrollers, processors, and field programmable gate arrays (FPGA) increasingly constitute the hardware backbone for modern electronic systems, including internet of things (IoT) devices. Howev
Autor:
Swarup Bhunia, Indrani Roy, Patanjali Slpsk, Milind Srivastava, Aritra Hazra, Chester Rebeiro
Publikováno v:
DATE
Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only a tiny fraction of the gates is exploitable by such