Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Sohrab Aftabjahani"'
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 18:1-22
High-level synthesis (HLS) is essential to map the high-level language (HLL) description (e.g., in C/C++) of hardware design to the corresponding Register Transfer Level (RTL) to produce hardware-independent design specifications with reduced design
Autor:
Islam Elsadek, Sohrab Aftabjahani, Doug Gardner, Erik MacLean, John Ross Wallrabenstein, Eslam Yahya Tawfik
Publikováno v:
2022 IEEE International Symposium on Circuits and Systems (ISCAS).
Hardware and Energy Efficiency Evaluation of NIST Lightweight Cryptography Standardization Finalists
Autor:
Islam Elsadek, Sohrab Aftabjahani, Doug Gardner, Erik MacLean, John Ross Wallrabenstein, Eslam Yahya Tawfik
Publikováno v:
2022 IEEE International Symposium on Circuits and Systems (ISCAS).
Autor:
Mark Tehranipoor, Farimah Farahmandi, Jason Oberg, Nicole Fern, Alric Althoff, Ryan Kastner, Sohrab Aftabjahani, Anders Nordstrom
Publikováno v:
VTS
Although hardware security has received significant attention in the past decade or so, security design and validation engineers and researchers in industry, academia, and government have not still been equipped with a mature security-aware toolset t
Autor:
Sohrab Aftabjahani, Magdy S. Abadir
Publikováno v:
ITC
International Verification and Security Workshop intends to bring industry practitioners and researchers from the fields of security, verification, validation, test, and reliability to exchange innovative ideas and to develop new methodologies for so
Autor:
Sohrab Aftabjahani, Magdy S. Abadir
Publikováno v:
ITC
International Microprocessor/SoC Test, Security and Validation (MTV) Workshop intends to bring researchers and practitioners from the fields of verification, security and test together to exchange innovative ideas and to develop new methodologies to
Publikováno v:
VTS
The IP session focuses on challenges, opportunities, and solutions to hardware security. The first contribution discusses design for security and security validation challenges needed to be considered by EDA industry. The second presentation then tal