selected publications
-
academic article
- Impact of Aging on the Reliability of Delay PUFs. Journal of Electronic Testing. 34:571-586. 2018
- An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE Transactions on Information Forensics and Security. 13:3008-3018. 2018
- The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. Journal of Hardware and Systems Security. 2:162-178. 2018
- A Generic Table Recomputation-Based Higher-Order Masking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 36:1779-1789. 2017
- PFD—A Flexible Higher-Order Masking Scheme. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 36:1327-1339. 2016
- Cryptographically Secure Shield for Security IPs Protection. IEEE Transactions on Computers. 1-1. 2016
- Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. IEEE Transactions on Information Theory. 60:7026-7034. 2014
- Sophisticated security verification on routing repaired balanced cell‐based dual‐rail logic against side channel analysis. IET Information Security. 9:1-13. 2014
- Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. Journal of Cryptographic Engineering. 4:259-274. 2014
- Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography. International Journal of Reconfigurable Computing. 2012:1-9. 2012
- On the Implementation of a Probabilistic Equalizer for Low-Cost Impulse Radio UWB in High Data Rate. Wireless Sensor Network. 01:245-256. 2009
-
blog posting
- High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures.. IACR Cryptology ePrint Archive. 147. 2015
- Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. arXiv (Cornell University). 2014
-
book
-
chapter
- Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter. Lecture notes in computer science. 439-454. 2016
- Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. Lecture notes in computer science. 248-268. 2015
- Stochastic Model of a Metastability-Based True Random Number Generator. Lecture notes in computer science. 92-105. 2013
-
conference paper
- A Tale of Two Models: Discussing the Timing and Sampling EM Fault Injection Models. . 2023
- Highlighting Two EM Fault Models While Analyzing a Digital Sensor Limitations. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015. 2023
- Private circuits II versus fault injection attacks. . 1-9. 2015
- High precision fault injections on the instruction cache of ARMv7-M architectures. . 2015
- HCODE. . 1-11. 2014
- Encoding the state of integrated circuits. . 1-10. 2014
- Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures. . 1-6. 2014
- Side-channel leakage and trace compression using normalized inter-class variance. . 1-9. 2014
- Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding. . 1-11. 2014
- A low-entropy first-degree secure provable masking scheme for resource-constrained devices. . 1-10. 2013
- On-Chip Power Noise Measurements of Cryptographic VLSI Circuits and Interpretation for Side-Channel Analysis. HAL (Le Centre pour la Communication Scientifique Directe). 2013
- An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF. . 156-162. 2012
- Non intrusive fault detection through electromagnetism analysis. . 1-8. 2011
- Overview of Dual rail with Precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors. . 1-8. 2009
- A Novel Asynchronous e-FPGA Architecture for Security Applications. . 369-372. 2007