Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
Create or connect your ORCID iD
Works (70)
2024 article
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature
2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 90–100.
2024 journal article
Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems
Journal of Hardware and Systems Security, 8(2), 94–112.
2024 article
Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware
PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, pp. 495–495.
2024 article
Leaking secrets in homomorphic encryption with side-channel attacks
Aydin, F., & Aysu, A. (2024, January 12). JOURNAL OF CRYPTOGRAPHIC ENGINEERING.
2024 journal article
Masking FALCON’s Floating-Point Multiplication in Hardware
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 483–508.
2024 article proceedings
Pre-Silicon Side-Channel Analysis of AI/ML Systems
2024 journal article
RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost
ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 17(4).
2024 journal article
TPUXtract: An Exhaustive Hyperparameter Extraction Framework
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 78–103.
2023 article proceedings
A Full-Stack Approach for Side-Channel Secure ML Hardware
2023 conference paper
A Survey of Software Implementations for the Number Theoretic Transform
In C. Silvano, C. Pilato, & M. Reichenbach (Eds.), Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023 (pp. 328–344).
Ed(s): C. Silvano, C. Pilato & M. Reichenbach

2023 article
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference
2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 155–166.
2023 journal article
Introduction to the Special Issue on the Digital Threats of Hardware Security
Digital Threats: Research and Practice, 4(2), 1–2.
2023 article
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.
2023 journal article
SeqL plus : Secure Scan-Obfuscation With Theoretical and Empirical Validation
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 42(5), 1406–1410.

2022 journal article
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform
IEEE TRANSACTIONS ON COMPUTERS, 71(11), 2829–2843.
2022 article
Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252.
2022 journal article
Better Performance, Higher Reliability, More Security: Research Highlights from the Center for Advanced Electronics through Machine Learning
Electronic Device Failure Analysis, 24(2), 34–36.
2022 article proceedings
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
2022 article proceedings
FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS
Event: 2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)

2022 journal article
Guarding Machine Learning Hardware Against Physical Side-channel Attacks
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 18(3).
2022 article proceedings
Hands-On Teaching of Hardware Security for Machine Learning
2022 article
High-Fidelity Model Extraction Attacks via Remote Power Monitors
2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.
2022 conference paper
Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety
In F. Regazzoni & M. van Dijk (Eds.), CCSW'22: Proceedings of the 2022 on Cloud Computing Security Workshop (pp. 7–8).
Ed(s): F. Regazzoni & M. van Dijk
2022 article proceedings
PR Crisis
2022 article proceedings
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library
2022 article
Towards AI-Enabled Hardware Security: Challenges and Opportunities
2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022).
2021 journal article
2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 40(6), 1217–1229.
2021 article
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), pp. 583–590.
2021 journal article
Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography
IEEE TRANSACTIONS ON COMPUTERS, 71(8), 1810–1823.
2021 article
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), pp. 691–696.
2021 journal article
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols
ACM Transactions on Embedded Computing Systems, 20(6), 1–22.

2021 journal article
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
IACR Transactions on Cryptographic Hardware and Embedded Systems, 506–556.
2021 article
Single-Trace Side-Channel Attacks on omega-Small Polynomial Sampling
2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 35–45.
2021 article
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD).

2021 article
iTimed: Cache Attacks on the Apple A10 Fusion SoC
2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 80–90.
2020 article proceedings
A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography
2020 article
BoMaNet: Boolean Masking of an Entire Neural Network
2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).
2020 chapter book
DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks
2020 article proceedings
Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors
2020 journal article
High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems
IEEE EMBEDDED SYSTEMS LETTERS, 12(4), 133–136.
2020 article
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk
2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).
2020 article proceedings
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection
2020 article
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform
2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), pp. 26–32.
2020 article proceedings
SeqL: Secure Scan-Locking for IP Protection
2019 article
Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers
GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, pp. 237–242.
2019 article proceedings
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems
2018 article proceedings
Binary Ring-LWE hardware with power side-channel countermeasures
2018 article proceedings
Fresh re-keying with strong PUFs: A new approach to side-channel security
2018 article proceedings
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols

2017 article proceedings
A new maskless debiasing method for lightweight physical unclonable functions

2017 chapter book
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
2016 article proceedings
A Design Method for Remote Integrity Checking of Complex PCBs
2016 journal article
Compact and low‐power ASIP design for lightweight PUF‐based authentication protocols
IET Information Security, 10(5), 232–241.

2016 journal article
Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms
IEEE Transactions on Computers, 65(9), 2925–2931.

2015 chapter book
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
2015 chapter book
BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
2015 chapter book
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
2015 journal article
Hardware/software co-design of physical unclonable function based authentications on FPGAs
Microprocessors and Microsystems, 39(7), 589–597.
2015 journal article
The Future of Real-Time Security
ACM Transactions on Embedded Computing Systems, 14(3), 1–18.
2014 article proceedings
A low power adaptive H.264 video encoder hardware

2014 article proceedings
Analyzing and eliminating the causes of fault sensitivity analysis

2014 journal article
SIMON Says: Break Area Records of Block Ciphers on FPGAs
IEEE Embedded Systems Letters, 6(2), 37–40.
2013 article proceedings
Digital fingerprints for low-cost platforms using MEMS sensors
2013 article proceedings
Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications
2013 article proceedings
Low-cost and area-efficient FPGA implementations of lattice-based cryptography
2013 article proceedings
PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs
2013 chapter book
Three Design Dimensions of Secure Embedded Systems
2011 journal article
A low energy adaptive hardware for H.264 multiple reference frame motion estimation
IEEE Transactions on Consumer Electronics, 57(3), 1377–1383.

2011 article proceedings
A reconfigurable H.264 video encoder hardware

2010 article proceedings
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing
Presented at the SIN '10: 3rd International Conference of Security of Information and Networks.