Works (22)

Updated: February 3rd, 2024 05:00

2024 article

Leaking secrets in homomorphic encryption with side-channel attacks

Aydin, F., & Aysu, A. (2024, January 12). JOURNAL OF CRYPTOGRAPHIC ENGINEERING.

By: F. Aydin n & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Homomorphic encryption; SEAL; Number theoretic transform; Compiler optimizations; Side-channel attacks; Machine learning
Source: Web Of Science
Added: January 29, 2024

2023 article

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference

2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 155–166.

By: A. Dubey n, R. Cammarota*, A. Varna*, R. Kumar* & A. Aysu n

co-author countries: United Kingdom of Great Britain and Northern Ireland 🇬🇧 United States of America 🇺🇸
author keywords: machine learning inference; side-channel analysis; masking; flexibility
Source: Web Of Science
Added: August 7, 2023

2023 article

SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs

2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.

By: E. Karabulut n, A. Awad n & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Multi-tenant cloud FPGAs; access control mechanism; memory isolation
Source: Web Of Science
Added: September 11, 2023

2023 journal article

SeqL plus : Secure Scan-Obfuscation With Theoretical and Empirical Validation

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 42(5), 1406–1410.

co-author countries: Germany 🇩🇪 United States of America 🇺🇸
author keywords: Flip-flops; Logic gates; Security; Complexity theory; Resists; Resilience; Iterative algorithms; IP piracy; scan-chains; scan-scrambling
Source: Web Of Science
Added: June 5, 2023

2022 journal article

An Extensive Study of Flexible Design Methods for the Number Theoretic Transform

IEEE TRANSACTIONS ON COMPUTERS, 71(11), 2829–2843.

co-author countries: Türkiye 🇹🇷 United States of America 🇺🇸
author keywords: NTT; flexible; hardware; HLS; RISC-V
Source: Web Of Science
Added: October 24, 2022

2022 article

Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto

PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252.

By: G. Haas n & A. Aysu n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: September 11, 2023

2022 article

FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS

2022 IEEE 30TH INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2022), pp. 113–121.

By: A. Gajjar n, P. Kashyap n, A. Aysu n, P. Franzon n, S. Dey* & C. Cheng*

co-author countries: United States of America 🇺🇸
Sources: Web Of Science, ORCID
Added: October 11, 2022

2022 journal article

Guarding Machine Learning Hardware Against Physical Side-channel Attacks

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 18(3).

By: A. Dubey n, R. Cammarota*, V. Suresh* & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Side-channel attack; neural networks; masking
Source: Web Of Science
Added: December 5, 2022

2022 article

High-Fidelity Model Extraction Attacks via Remote Power Monitors

2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.

By: A. Dubey n, E. Karabulut n, A. Awad n & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Neural networks; model stealing; time-to-digital converters; secure virtualization
Source: Web Of Science
Added: November 7, 2022

2022 article

Towards AI-Enabled Hardware Security: Challenges and Opportunities

2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022).

By: H. Sayadi*, M. Aliasgari*, F. Aydin n, S. Potluri n, A. Aysu n, J. Edmonds*, S. Tehranipoor*

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 24, 2022

2021 journal article

2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 40(6), 1217–1229.

By: P. Kashyap n, F. Aydin n, S. Potluri n, P. Franzon n & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Resistance; Performance evaluation; Deep learning; Protocols; Power measurement; Side-channel attacks; NIST; Cross-device; data-augmentation; deep learning (DL); lattice-based key-exchange protocols; power side channels
Sources: Web Of Science, ORCID
Added: June 10, 2021

2021 article

An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature

2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), pp. 583–590.

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Hardware Security; Post-quantum Cryptography; Correlation Power Analysis; Digital Signature; Number Theoretic Transform
Source: Web Of Science
Added: March 28, 2022

2021 journal article

Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography

IEEE TRANSACTIONS ON COMPUTERS, 71(8), 1810–1823.

By: E. Karabulut n, E. Alkim* & A. Aysu n

co-author countries: Türkiye 🇹🇷 United States of America 🇺🇸
author keywords: Hardware; Cryptography; Gaussian distribution; Standards; Timing; Optimization; Encryption; Discrete gaussian sampling; lattice cryptography; FPGA
Source: Web Of Science
Added: July 18, 2022

2021 article

FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks

2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), pp. 691–696.

By: E. Karabulut n & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: side-channel attacks; post-quantum cryptography; digital signatures
Source: Web Of Science
Added: March 28, 2022

2021 article

Single-Trace Side-Channel Attacks on omega-Small Polynomial Sampling

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 35–45.

By: E. Karabulut n, E. Alkim* & A. Aysu n

co-author countries: Türkiye 🇹🇷 United States of America 🇺🇸
author keywords: Side-channel attacks; Post-quantum cryptography; NTRU; CRYSTALS-DILITHIUM
Source: Web Of Science
Added: June 13, 2022

2021 article

Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware

2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD).

By: S. Potluri n & A. Aysu n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: February 21, 2022

2021 article

iTimed: Cache Attacks on the Apple A10 Fusion SoC

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 80–90.

By: G. Haas n, S. Potluri n & A. Aysu n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: June 13, 2022

2020 article

BoMaNet: Boolean Masking of an Entire Neural Network

2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).

By: A. Dubey n, R. Cammarota* & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Masking; neural networks; side-channel attacks; model stealing
Source: Web Of Science
Added: August 30, 2021

2020 journal article

High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems

IEEE EMBEDDED SYSTEMS LETTERS, 12(4), 133–136.

By: E. Ozcan* & A. Aysu n

co-author countries: Türkiye 🇹🇷 United States of America 🇺🇸
author keywords: Field programmable gate array (FPGA); hardware design; high-level synthesis (HLS); lattice-based cryptography; post-quantum cryptography
Source: Web Of Science
Added: January 4, 2021

2020 article

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk

2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).

By: F. Regazzoni*, S. Bhasin*, A. Pour*, I. Alshaer*, F. Aydin n, A. Aysu n, V. Beroulle*, G. Di Natale* ...

co-author countries: Germany 🇩🇪 France 🇫🇷 Ireland 🇮🇪 Japan 🇯🇵 Netherlands 🇳🇱 Singapore 🇸🇬 United States of America 🇺🇸
author keywords: machine learning; hardware security
Sources: Web Of Science, ORCID
Added: August 30, 2021

2020 article

RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform

2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), pp. 26–32.

By: E. Karabulut n & A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: Lattice-Based Cryptography; RISC-V; NTT
Source: Web Of Science
Added: August 23, 2021

2019 article

Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers

GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, pp. 237–242.

By: A. Aysu n

co-author countries: United States of America 🇺🇸
author keywords: education; hardware security; post-quantum cryptography; FPGA
Source: Web Of Science
Added: July 29, 2019

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.