Works (167)

Updated: March 9th, 2026 08:11

2026 article

A Comparison of Unified Multiplier Designs for the Falcon Post-quantum Digital Signature

Magesh, R., Ayyagari, M., Pendyala, S., & Aysu, A. (2026, January 1). Lecture Notes in Computer Science, Vol. 1.

By: R. Magesh n, M. Ayyagari n, S. Pendyala n & A. Aysu n

topics (OpenAlex): Cryptography and Residue Arithmetic; Digital Filter Design and Implementation; Coding theory and cryptography; Low-power high-performance VLSI design; Numerical Methods and Algorithms
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: February 5, 2026

2026 article

ASIC Tape-Out of the First Side-Channel Protected Neural Network Design

Dubey, A., Cammarota, R., & Aysu, A. (2026, January 1). IEEE Design and Test.

By: A. Dubey, R. Cammarota & A. Aysu

topics (OpenAlex): Wireless Signal Modulation Classification; Neural Networks and Applications; Adversarial Robustness in Machine Learning
Source: ORCID
Added: March 3, 2026

2026 article

Preemption-Enhanced Benchmark Suite for FPGAs

Malik, A. A., Buchanan, J., & Aysu, A. (2026, January 1). IEEE Access, Vol. 1.

By: A. Malik n, J. Buchanan n & A. Aysu n

topics (OpenAlex): Embedded Systems Design Techniques; Numerical Methods and Algorithms; VLSI and FPGA Design Techniques; Parallel Computing and Optimization Techniques; Big Data and Digital Economy
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, ORCID, NC State University Libraries
Added: January 22, 2026

2025 article

CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon

Malik, A. A., Mihir, H., & Aysu, A. (2025, October 17).

By: A. Malik n, H. Mihir n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; VLSI and Analog Circuit Testing
Source: ORCID
Added: February 18, 2026

2025 journal article

Craft: Characterizing and root-causing fault injection threats at pre-silicon

ArXiv Preprint ArXiv:2503.03877.

By: A. Malik, H. Mihir & A. Aysu

Source: ORCID
Added: February 23, 2026

2025 article proceedings

Exploiting Power Side-Channel Vulnerabilities in XGBoost Accelerator

By: Y. Xiao n, A. Gajjar n, A. Aysu n & P. Franzon n

Event: 2025 62nd ACM/IEEE Design Automation Conference (DAC)

topics (OpenAlex): Smart Grid Security and Resilience; Electrostatic Discharge in Electronics; Advanced Malware Detection Techniques
Sources: Crossref, NC State University Libraries
Added: March 9, 2026

2025 article proceedings

GateBleed: Exploiting On-Core Accelerator Power Gating for High Performance and Stealthy Attacks on AI

topics (OpenAlex): Cryptographic Implementations and Security; Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security
Sources: ORCID, Crossref, NC State University Libraries
Added: October 17, 2025

2025 article

Hardware-Enabled Mechanisms for Verifying Responsible AI Development

Aidan, O. G., Kulp, G., Hodgkins, W., Petrie, J., Immler, V., Aysu, A., … Srivastava, A. (2025, July 20). SuperIntelligence - Robotics - Safety & Alignment.

By: O. Aidan*, G. Kulp*, W. Hodgkins, J. Petrie, V. Immler*, A. Aysu n, K. Basu, S. Bhasin*, S. Picek*, A. Srivastava*

topics (OpenAlex): Ethics and Social Impacts of AI
Source: NC State University Libraries
Added: November 22, 2025

2025 journal article

Hardware-Enabled Mechanisms for Verifying Responsible AI Development

ArXiv Preprint ArXiv:2505.03742.

By: A. O'Gara, G. Kulp, W. Hodgkins, J. Petrie, V. Immler, A. Aysu, K. Basu, S. Bhasin, S. Picek, A. Srivastava

Source: ORCID
Added: February 23, 2026

2025 journal article

Integrating Cybersecurity in K-12 Education Through Hybrid Experiential Professional Development for Middle and High School Teachers

Journal of Technology and Teacher Education, 33(4), 721–752.

By: F. Martin, A. Aysu*, R. Davis*, S. Long, D. Culbreth & H. Mihir

topics (OpenAlex): Information and Cyber Security; Cybersecurity and Cyber Warfare Studies; Digital literacy in education
Sources: Crossref, NC State University Libraries, ORCID
Added: January 30, 2026

2025 article

Machine Learning-Aided Detection of DoS Attacks in Power Systems using Side-Channel Monitoring

Khatua, R., Aysu, A., & Chakrabortty, A. (2025, October 26). (Vol. 10). Vol. 10.

By: R. Khatua n, A. Aysu n & A. Chakrabortty n

topics (OpenAlex): Smart Grid Security and Resilience; Cryptographic Implementations and Security; Security and Verification in Computing
Sources: NC State University Libraries, NC State University Libraries
Added: December 10, 2025

2025 article

Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch

Malik, A. A., Aydin, F., & Aysu, A. (2025, October 14). (Vol. 10). Vol. 10.

By: A. Malik n, F. Aydin* & A. Aysu n

topics (OpenAlex): Neural Networks and Reservoir Computing; Neural Networks Stability and Synchronization; Advanced Memory and Neural Computing; Adversarial Robustness in Machine Learning; Security and Verification in Computing; Physical Unclonable Functions (PUFs) and Hardware Security
Sources: NC State University Libraries, NC State University Libraries
Added: January 9, 2026

2025 article

Quantum Leak: Timing Side-Channel Attacks on Cloud-Based Quantum Services

Lu, C., Telang, E., Aysu, A., & Basu, K. (2025, June 27).

By: C. Lu*, E. Telang n, A. Aysu n & K. Basu*

topics (OpenAlex): Quantum Computing Algorithms and Architecture; Quantum Information and Cryptography; Cryptographic Implementations and Security
Source: ORCID
Added: February 23, 2026

2025 journal article

SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis

Cryptology EPrint Archive.

By: J. Qiu & A. Aysu

Source: ORCID
Added: February 23, 2026

2025 article

Side-Channel Aware Training for Commercial Machine Learning Accelerators

Dubey, A., & Aysu, A. (2025, May).

By: A. Dubey & A. Aysu

Source: ORCID
Added: February 23, 2026

2025 journal article

Stochastic Training for Side-Channel Resilient AI

ArXiv Preprint ArXiv:2506.06597.

By: A. Dubey & A. Aysu

Source: ORCID
Added: February 23, 2026

2025 article

THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs

Karabulut, E., Malik, A. A., Awad, A., & Aysu, A. (2025, May 5). IEEE Transactions on Computers, Vol. 5.

By: E. Karabulut*, A. Malik n, A. Awad* & A. Aysu n

author keywords: Field programmable gate arrays; Resource management; Scheduling algorithms; Measurement; Job shop scheduling; Energy efficiency; Spatiotemporal phenomena; Hardware; Cloud computing; Dynamic scheduling; Fair scheduling; multi-tenancy; cloud FPGAs
topics (OpenAlex): Embedded Systems Design Techniques; Low-power high-performance VLSI design; VLSI and Analog Circuit Testing
Sources: Web Of Science, ORCID, NC State University Libraries
Added: June 23, 2025

2025 journal article

THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs

IEEE Transactions on Computers.

By: E. Karabulut, A. Malik, A. Awad & A. Aysu

Source: ORCID
Added: February 23, 2026

2025 journal article

TPUXtract: An Exhaustive Hyperparameter Extraction Framework

IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 78–103.

By: A. Kurian, A. Dubey, F. Yaman & A. Aysu

Source: ORCID
Added: February 23, 2026

2025 article

The Fellowship of the Leak: Power Analysis of a Masked FrodoKEM Hardware Accelerator

Schmid, M., Manzoni, G., Aysu, A., & Kavun, E. B. (2025, October 26). (Vol. 10). Vol. 10.

By: M. Schmid*, G. Manzoni*, A. Aysu n & E. Kavun*

topics (OpenAlex): Low-power high-performance VLSI design; Parallel Computing and Optimization Techniques; Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Cryptography and Residue Arithmetic
Sources: NC State University Libraries, NC State University Libraries
Added: November 21, 2025

2025 article

Timed Physical Password or Authentication Keys

Martin, A., Kiptoo, D. J., Kanoy, D. S., Li, S., Du, C., Kumar, M., … Thuo, M. (2025, May 16). ACS Applied Materials & Interfaces, Vol. 5.

By: A. Martin n, D. Kiptoo n, D. Kanoy n, S. Li*, C. Du*, M. Kumar*, A. Pauls n, S. Pathak* ...

author keywords: Phase Transition; Metastability; InformationStorage; Complex Particles; Undercooling; Metastable Solid; Physically Unclonable Function
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; User Authentication and Security Systems; Cryptographic Implementations and Security
Sources: Web Of Science, NC State University Libraries
Added: May 27, 2025

2025 journal article

Timed Physical Password or Authentication Keys

ACS Applied Materials & Interfaces.

By: A. Martin, D. Kiptoo, D. Kanoy, S. Li, C. Du, M. Kumar, A. Pauls, S. Pathak ...

Source: ORCID
Added: February 23, 2026

2024 article

A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature

Karabulut, E., & Aysu, A. (2024, May 6).

By: E. Karabulut n & A. Aysu n

author keywords: discrete Gaussian sampling; hardware-software co-design; post-quantum cryptography; digital signatures; FPGA
topics (OpenAlex): Embedded Systems Design Techniques; Digital Image Processing Techniques
Source: Web Of Science
Added: July 30, 2024

2024 conference paper

A hardware-software co-design for the discrete gaussian sampling of falcon digital signature

2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 90–100.

By: E. Karabulut & A. Aysu

Source: ORCID
Added: February 23, 2026

2024 journal article

An Open Source Ecosystem for Implementation Security Testing

Cryptology EPrint Archive.

By: A. Aysu, F. Ganji, T. Marcantonio & P. Schaumont

Source: ORCID
Added: February 23, 2026

2024 journal article

Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems

Journal of Hardware and Systems Security, 8(2), 94–112.

By: A. Malik n, E. Karabulut n, A. Awad n & A. Aysu n

Contributors: A. Malik n, E. Karabulut n, A. Awad n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Security and Verification in Computing; Advanced Malware Detection Techniques
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Crossref, ORCID
Added: February 3, 2025

2024 article

Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware

Aydin, F., Karabulut, E., & Aysu, A. (2024, June 10). (Vol. 6). Vol. 6.

By: F. Aydin n, E. Karabulut n & A. Aysu n

author keywords: Pre-silicon; Side-channel analysis; pre-silicon validation; AI/ML hardware
topics (OpenAlex): Adversarial Robustness in Machine Learning; Security and Verification in Computing; Radiation Effects in Electronics
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 26, 2024

2024 article

Leaking secrets in homomorphic encryption with side-channel attacks

Aydin, F., & Aysu, A. (2024, January 12). Journal of Cryptographic Engineering.

By: F. Aydin n & A. Aysu n

author keywords: Homomorphic encryption; SEAL; Number theoretic transform; Compiler optimizations; Side-channel attacks; Machine learning
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Cryptography and Data Security
TL;DR: This article demonstrates side-channel leakages of the Microsoft SEAL HE library and proposes two attacks that can steal encryption keys during the key generation phase by abusing the leakage of ternary value assignments that occurs during the number theoretic transform (NTT) algorithm. (via Semantic Scholar)
Source: Web Of Science
Added: January 29, 2024

2024 journal article

Leaking secrets in homomorphic encryption with side-channel attacks

Journal of Cryptographic Engineering, 14(2), 241–251.

By: F. Aydin & A. Aysu

Source: ORCID
Added: February 23, 2026

2024 journal article

Masking FALCON’s Floating-Point Multiplication in Hardware

IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 483–508.

By: E. Karabulut n & A. Aysu n

topics (OpenAlex): Numerical Methods and Algorithms; Digital Filter Design and Implementation; Parallel Computing and Optimization Techniques
Sources: Crossref, ORCID
Added: February 3, 2025

2024 article proceedings

Pre-Silicon Side-Channel Analysis of AI/ML Systems

By: F. Aydin n, E. Karabulut n & A. Aysu n

author keywords: Pre-silicon; Side-channel analysis; Differential power analysis; Machine learning; RISC-V
topics (OpenAlex): Embedded Systems Design Techniques; Radiation Effects in Electronics
Sources: Crossref, Web Of Science
Added: February 3, 2025

2024 conference paper

Pre-Silicon Side-Channel Analysis of AI/ML Systems

2024 IEEE Physical Assurance and Inspection of Electronics (PAINE), 1–7.

By: F. Aydin, E. Karabulut & A. Aysu

Source: ORCID
Added: February 23, 2026

2024 conference paper

Pre-silicon vulnerability assessment for AI/ML hardware

Proceedings of the Great Lakes Symposium on VLSI 2024, 495–495.

By: F. Aydin, E. Karabulut & A. Aysu

Source: ORCID
Added: February 23, 2026

2024 journal article

Quantum leak: Timing side-channel attacks on cloud-based quantum services

ArXiv Preprint ArXiv:2401.01521.

By: C. Lu, E. Telang, A. Aysu & K. Basu

Source: ORCID
Added: February 23, 2026

2024 article

RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost

Gajjar, A., Kashyap, P., Aysu, A., Franzon, P., Choi, Y., Cheng, C., … Ignowski, J. (2024, August 12). ACM Transactions on Reconfigurable Technology and Systems, Vol. 8.

author keywords: FPGAs; XGBoost; Binary Classification; High-Level Synthesis; Ransomware; Hardware Performance Counters; Accelerators; Machine Learning
topics (OpenAlex): Advanced Malware Detection Techniques; Network Security and Intrusion Detection; Digital and Cyber Forensics
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 15, 2024

2024 journal article

RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost

ACM Transactions on Reconfigurable Technology and Systems, 17(4), 1–33.

By: A. Gajjar, P. Kashyap, A. Aysu, P. Franzon, Y. Choi, C. Cheng, G. Pedretti, J. Ignowski

Source: ORCID
Added: February 23, 2026

2024 report

Side-Channel Aware Training for Commercial Machine Learning Accelerators

(US Patent Application No. 18/950,948).

By: A. Aysu & D. Anuj

Source: NC State University Libraries
Added: April 10, 2025

2024 journal article

TPUXtract: An Exhaustive Hyperparameter Extraction Framework

IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 78–103.

By: A. Kurian n, A. Dubey n, F. Yaman n & A. Aysu n

topics (OpenAlex): Machine Learning and Data Classification
Source: Crossref
Added: February 3, 2025

2024 journal article

Technology and Systems

ACM Transactions On, 17(4).

By: S. Singh, Y. Liang, Y. Chen, N. Mentens, R. Nijssen, G. Li, Z. Ye, D. Chen ...

Source: ORCID
Added: February 23, 2026

2023 article proceedings

A Full-Stack Approach for Side-Channel Secure ML Hardware

By: A. Dubey n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
Source: Crossref
Added: February 3, 2025

2023 conference paper

A Survey of Software Implementations for the Number Theoretic Transform

In C. Silvano, C. Pilato, & M. Reichenbach (Eds.), Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023 (pp. 328–344).

Ed(s): C. Silvano, C. Pilato & M. Reichenbach

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Cryptography and Residue Arithmetic
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: February 10, 2025

2023 conference paper

A full-stack approach for side-channel secure ML hardware

2023 IEEE international test conference (ITC), 186–195.

By: A. Dubey & A. Aysu

Source: ORCID
Added: February 23, 2026

2023 article

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference

Dubey, A., Cammarota, R., Varna, A., Kumar, R., & Aysu, A. (2023, May 1).

author keywords: machine learning inference; side-channel analysis; masking; flexibility
topics (OpenAlex): Cryptographic Implementations and Security; Security and Verification in Computing; Advanced Malware Detection Techniques
TL;DR: This paper develops a secure RISCV-based coprocessor design that can execute a neural network implemented in C/C++ that uses masking to execute various neural network operations like weighted summations, activation functions, and output layer computation in a sidechannel secure fashion. (via Semantic Scholar)
Source: Web Of Science
Added: August 7, 2023

2023 journal article

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference

Cryptology EPrint Archive.

By: A. Dubey, R. Cammarota, A. Varna, R. Kumar & A. Aysu

Source: ORCID
Added: February 23, 2026

2023 journal article

Introduction to the Special Issue on the Digital Threats of Hardware Security

Digital Threats: Research and Practice, 4(2), 1–2.

By: A. Aysu n & S. Graham*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques
Sources: Crossref, ORCID, NC State University Libraries
Added: February 3, 2025

2023 article

Introduction to the Special Issue on the Digital Threats of Hardware Security

Digital Threats: Research and Practice, Vol. 4, pp. 1–2. ACM New York, NY.

By: A. Aysu & S. Graham

Source: ORCID
Added: February 23, 2026

2023 article

SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs

Karabulut, E., Awad, A., & Aysu, A. (2023, May 21). (Vol. 5). Vol. 5.

By: E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Multi-tenant cloud FPGAs; access control mechanism; memory isolation
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing; Cryptographic Implementations and Security
TL;DR: This paper proposes an improved access control mechanism for multi-tenant cloud FPGAs that allows dynamic configuration of access control privileges and has three advantages: enabling secure resource sharing of on-chip BRAMs to tenants, enabling safe sharing by resolving deadlocks and faulty access requests, and improvement in latency and throughput. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: September 11, 2023

2022 article

Apple vs. EMA

Haas, G., & Aysu, A. (2022, July 10). Proceedings of the 59th ACM/IEEE Design Automation Conference, Vol. 7.

By: G. Haas n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Security and Verification in Computing; Chaos-based Image/Signal Encryption
TL;DR: This work implements an optimized side channel acquisition infrastructure involving both custom iPhone software and accelerated analysis code and finds that an adversary which can observe 5--30 million known-ciphertext traces can reliably extract secret AES keys using electromagnetic (EM) radiation as a side channel. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: September 11, 2023

2022 conference paper

Apple vs. EMA: electromagnetic side channel attacks on apple CoreCrypto

Proceedings of the 59th ACM/IEEE Design Automation Conference, 247–252.

By: G. Haas & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 journal article

Better Performance, Higher Reliability, More Security: Research Highlights from the Center for Advanced Electronics through Machine Learning

Electronic Device Failure Analysis, 24(2), 34–36.

By: A. Aysu, X. Chen, W. Davis, S. Lim, P. Franzon, M. Swaminathan, E. Rosenbaum

Sources: NC State University Libraries, ORCID
Added: February 10, 2025

2022 article proceedings

Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library

By: F. Aydin n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Cryptography and Data Security; Security and Verification in Computing
Source: Crossref
Added: February 3, 2025

2022 conference paper

Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library

Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 95–100.

By: F. Aydin & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 article proceedings

FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS

By: A. Gajjar n, P. Kashyap n, A. Aysu n, P. Franzon n, S. Dey* & C. Cheng*

topics (OpenAlex): Advanced Malware Detection Techniques; Adversarial Robustness in Machine Learning; Advanced Neural Network Applications
TL;DR: An FPGA-based XGBoost accelerator designed with High-Level Synthesis (HLS) tools and design flow accelerating binary classification inference is showcased, showing a latency speedup of the proposed design over state-of-art CPU and GPU implementations, including energy efficiency and cost-effectiveness. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, NC State University Libraries, ORCID, Crossref
Added: October 11, 2022

2022 conference paper

FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS

2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), 1–9.

By: A. Gajjar, P. Kashyap, A. Aysu, P. Franzon, S. Dey & C. Cheng

Source: ORCID
Added: February 23, 2026

2022 article

Guarding Machine Learning Hardware Against Physical Side-channel Attacks

Dubey, A., Cammarota, R., Suresh, V., & Aysu, A. (2022, February 2). ACM Journal on Emerging Technologies in Computing Systems.

By: A. Dubey n, R. Cammarota*, V. Suresh* & A. Aysu n

author keywords: Side-channel attack; neural networks; masking
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: This work develops and combines different flavors of side-channel defenses for ML models in the hardware blocks and proposes and optimize the first defense based on Boolean masking, which impedes a straightforward second-order attack on the first-order masked implementation. (via Semantic Scholar)
Source: Web Of Science
Added: December 5, 2022

2022 journal article

Guarding machine learning hardware against physical side-channel attacks

ACM Journal on Emerging Technologies in Computing Systems (JETC), 18(3), 1–31.

By: A. Dubey, R. Cammarota, V. Suresh & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 article proceedings

Hands-On Teaching of Hardware Security for Machine Learning

By: A. Calhoun n, E. Ortega n, F. Yaman n, A. Dubey n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 3, 2025

2022 conference paper

Hands-On Teaching of Hardware Security for Machine Learning

Proceedings of the Great Lakes Symposium on VLSI 2022, 455–461.

By: A. Calhoun, E. Ortega, F. Yaman, A. Dubey & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 article

High-Fidelity Model Extraction Attacks via Remote Power Monitors

Dubey, A., Karabulut, E., Awad, A., & Aysu, A. (2022, June 13). 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS).

By: A. Dubey n, E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Neural networks; model stealing; time-to-digital converters; secure virtualization
topics (OpenAlex): Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: It is demonstrated that a remote monitor implemented with time-to-digital converters can be exploited to steal the weights from a hardware implementation of NN inference, which expands the attack vector to multi-tenant cloud FPGA platforms. (via Semantic Scholar)
Source: Web Of Science
Added: November 7, 2022

2022 conference paper

High-Fidelity Model Extraction Attacks via Remote Power Monitors

2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS), 328–331.

By: A. Dubey, E. Karabulut, A. Awad & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 journal article

Modulonet: neural networks meet modular arithmetic for efficient hardware masking

IACR Transactions on Cryptographic Hardware and Embedded Systems, 506–556.

By: A. Dubey, A. Ahmad, M. Pasha, R. Cammarota & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 conference paper

Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety

In F. Regazzoni & M. van Dijk (Eds.), CCSW'22: Proceedings of the 2022 on Cloud Computing Security Workshop (pp. 7–8).

By: A. Aysu n

Ed(s): F. Regazzoni & M. van Dijk

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Radiation Effects in Electronics
Sources: NC State University Libraries, ORCID
Added: February 10, 2025

2022 article proceedings

PR Crisis

By: E. Karabulut n, C. Yuvarajappa n, M. Shaik n, S. Potluri n, A. Awad n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
Sources: Crossref, NC State University Libraries
Added: February 3, 2025

2022 conference paper

PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs

Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 101–106.

By: E. Karabulut, C. Yuvarajappa, M. Shaik, S. Potluri, A. Awad & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 article proceedings

RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library

topics (OpenAlex): Cryptographic Implementations and Security; Cryptography and Data Security; Coding theory and cryptography
Source: Crossref
Added: February 3, 2025

2022 conference paper

Reveal: Single-trace side-channel leakage of the seal homomorphic encryption library

2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1527–1532.

By: F. Aydin, E. Karabulut, S. Potluri, E. Alkim & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 article

SeqL+: Secure Scan-Obfuscation With Theoretical and Empirical Validation

Potluri, S., Kundu, S., Kumar, A., Basu, K., & Aysu, A. (2022, August 15). IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 8.

author keywords: Flip-flops; Logic gates; Security; Complexity theory; Resists; Resilience; Iterative algorithms; IP piracy; scan-chains; scan-scrambling
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Neuroscience and Neural Engineering
TL;DR: This study reveals the first formulation and complexity analysis of Boolean satisfiability (SAT)-based attack on scan-scrambling and proposes an iterative swapping-based scan-cell scrambling algorithm to defeat SAT-based attack. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: June 5, 2023

2022 journal article

SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

By: S. Potluri, S. Kundu, A. Kumar, K. Basu & A. Aysu

Source: ORCID
Added: February 23, 2026

2022 article

Towards AI-Enabled Hardware Security: Challenges and Opportunities

Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J., & Tehranipoor, S. (2022, September 12).

By: H. Sayadi*, M. Aliasgari*, F. Aydin n, S. Potluri n, A. Aysu n, J. Edmonds*, S. Tehranipoor*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing; Advanced Malware Detection Techniques
TL;DR: The growing role of AI/ML techniques in hardware and architecture security field is highlighted and insightful discussions on pressing challenges, opportunities, and future directions of designing accurate and efficient machine learning-based attacks and defense mechanisms in response to emerging hardware security vulnerabilities in modern computer systems and next generation of cryptosystems are provided. (via Semantic Scholar)
Source: Web Of Science
Added: October 24, 2022

2022 conference paper

Towards AI-Enabled Hardware Security: Challenges and Opportunities

2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), 1–10.

By: H. Sayadi, M. Aliasgari, F. Aydin, S. Potluri, A. Aysu, J. Edmonds, S. Tehranipoor

Source: ORCID
Added: February 23, 2026

2021 article

An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature

Chen, Z., Karabulut, E., Aysu, A., Ma, Y., & Jing, J. (2021, October 1).

By: Z. Chen*, E. Karabulut n, A. Aysu n, Y. Ma* & J. Jing*

author keywords: Hardware Security; Post-quantum Cryptography; Correlation Power Analysis; Digital Signature; Number Theoretic Transform
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
TL;DR: This work proposes an efficient non-profiled Correlation Power Analysis (CPA) strategy on Dilithium to recover the secret key by targeting the underlying polynomial multiplication arithmetic and constructs a hybrid scheme that combines the advantages of both schemes. (via Semantic Scholar)
Source: Web Of Science
Added: March 28, 2022

2021 conference paper

An efficient non-profiled side-channel attack on the CRYSTALS-Dilithium post-quantum signature

2021 IEEE 39th International Conference on Computer Design (ICCD), 583–590.

By: Z. Chen, E. Karabulut, A. Aysu, Y. Ma & J. Jing

Source: ORCID
Added: February 23, 2026

2021 journal article

Efficient, flexible, and constant-time gaussian sampling hardware for lattice cryptography

IEEE Transactions on Computers, 71(8), 1810–1823.

By: E. Karabulut, E. Alkim & A. Aysu

Source: ORCID
Added: February 23, 2026

2021 article

Efficient,Flexible,and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography

Karabulut, E., Alkim, E., & Aysu, A. (2021, January 1). IEEE Transactions on Computers.

By: E. Karabulut n, E. Alkim* & A. Aysu n

author keywords: Hardware; Cryptography; Gaussian distribution; Standards; Timing; Optimization; Encryption; Discrete gaussian sampling; lattice cryptography; FPGA
topics (OpenAlex): Cryptography and Data Security; Chaos-based Image/Signal Encryption; graph theory and CDMA systems
TL;DR: The proposed hardware can support all the discrete Gaussian distributions used in post-quantum digital signatures and key encapsulation algorithms, the homomorphic encryption library of SEAL, and other algorithms such BLISS digital signature and LP public-key encryption. (via Semantic Scholar)
Source: Web Of Science
Added: July 18, 2022

2021 article

FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks

Karabulut, E., & Aysu, A. (2021, November 8).

By: E. Karabulut n & A. Aysu n

author keywords: side-channel attacks; post-quantum cryptography; digital signatures
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption; Electrostatic Discharge in Electronics
TL;DR: The first side-channel attack on FALCON—a NIST Round-3 finalist for the post-quantum digital signature standard—is proposed and a known-plaintext attack that uses the electromagnetic measurements of the device to extract the secret signing keys, which then can be used to forge signatures on arbitrary messages. (via Semantic Scholar)
Source: Web Of Science
Added: March 28, 2022

2021 conference paper

Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks

Design Automation Conference (DAC).

By: E. Karabulut & A. Aysu

Source: ORCID
Added: February 23, 2026

2021 journal article

Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols

ACM Transactions on Embedded Computing Systems, 20(6), 1–22.

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Crossref, ORCID
Added: February 24, 2025

2021 journal article

ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking

IACR Transactions on Cryptographic Hardware and Embedded Systems, 506–556.

topics (OpenAlex): Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis
Source: Crossref
Added: February 3, 2025

2021 article

Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM

Karabulut, E., Alkim, E., & Aysu, A. (2021, December 12).

By: E. Karabulut n, E. Alkim* & A. Aysu n

author keywords: Side-channel attacks; Post-quantum cryptography; NTRU; CRYSTALS-DILITHIUM
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
TL;DR: A new single-trace side-channel attack on lattice-based post-quantum protocols is proposed, revealing that the sorting implementation in NTRU/NTRU Prime and the shuffling in CRYSTALS-DILITHIUM's ω-small polynomial sampling process leaks information about the ‘-1’’0’, or ’+1' assignments made to the coefficients. (via Semantic Scholar)
Source: Web Of Science
Added: June 13, 2022

2021 conference paper

Single-trace side-channel attacks on $ω$-small polynomial sampling: with applications to NTRU, NTRU prime, and crystals-dilithium

2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 35–45.

By: E. Karabulut, E. Alkim & A. Aysu

Source: ORCID
Added: February 23, 2026

2021 article

Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware

Potluri, S., & Aysu, A. (2021, November 1). 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD).

By: S. Potluri n & A. Aysu n

topics (OpenAlex): Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis
TL;DR: This paper shows a new style of attack, for the first time, on ML models running on embedded devices by abusing the scan-chain infrastructure, and outperforms mathematical model extraction proposed in CRYPTO 2020, USENIX 2020, and ICML 2020. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: February 21, 2022

2021 journal article

Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware

By: S. Potluri & A. Aysu

Source: ORCID
Added: February 23, 2026

2021 article

iTimed: Cache Attacks on the Apple A10 Fusion SoC

Haas, G., Potluri, S., & Aysu, A. (2021, December 12).

By: G. Haas n, S. Potluri n & A. Aysu n

topics (OpenAlex): Security and Verification in Computing; Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security
TL;DR: It is found that the first cache timing side-channel attack on one of Apple's mobile devices can reduce the security of OpenSSL AES-128 by 50 more bits than a straightforward adaptation of PRIME+PROBE, while requiring only half as many side channel measurement traces. (via Semantic Scholar)
Source: Web Of Science
Added: June 13, 2022

2021 journal article

iTimed: Cache Attacks on the Apple A10 Fusion SoC

By: G. Haas, S. Potluri & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article

2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

Kashyap, P., Aydin, F., Potluri, S., Franzon, P. D., & Aysu, A. (2020, November 17). IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 6, pp. 1–1.

By: P. Kashyap n, F. Aydin n, S. Potluri n, P. Franzon n & A. Aysu n

author keywords: Resistance; Performance evaluation; Deep learning; Protocols; Power measurement; Side-channel attacks; NIST; Cross-device; data-augmentation; deep learning (DL); lattice-based key-exchange protocols; power side channels
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: 2Deep—a deep-learning (DL)-based SCA—targeting parallelized implementations of PQKE protocols, namely, Frodo and NewHope with data augmentation techniques are proposed, exploring approaches that convert 1-D time-series power measurement data into 2-D images to formulate SCA an image recognition task. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: June 10, 2021

2020 journal article

2deep: Enhancing side-channel attacks on lattice-based key-exchange via 2-d deep learning

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 40(6), 1217–1229.

By: P. Kashyap, F. Aydin, S. Potluri, P. Franzon & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article proceedings

A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography

topics (OpenAlex): Cryptography and Data Security; Cryptography and Residue Arithmetic; Coding theory and cryptography
Source: Crossref
Added: March 2, 2025

2020 conference paper

A flexible and scalable NTT hardware: Applications from homomorphically encrypted deep learning to post-quantum cryptography

2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 346–351.

By: A. Mert, E. Karabulut, E. Öztürk, E. Savaş, M. Becchi & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article

An Extensive Study of Flexible Design Methods for the Number Theoretic Transform

Mert, A. C., Karabulut, E., Ozturk, E., Savas, E., & Aysu, A. (2020, August 19). IEEE Transactions on Computers, Vol. 8.

author keywords: NTT; flexible; hardware; HLS; RISC-V
topics (OpenAlex): Cryptographic Implementations and Security; Coding theory and cryptography; Cryptography and Residue Arithmetic
TL;DR: An extensive study of flexible design methods for NTT implementation by evaluating three cases: parametric hardware design, high-level synthesis (HLS) design approach, and design for software implementation compiled on soft-core processors, where all are targeted on reconfigurable hardware devices. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: October 24, 2022

2020 journal article

An extensive study of flexible design methods for the number theoretic transform

IEEE Transactions on Computers, 71(11), 2829–2843.

By: A. Mert, E. Karabulut, E. Öztürk, E. Savaş & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article

BoMaNet

Dubey, A., Cammarota, R., & Aysu, A. (2020, November 2). (Vol. 11). Vol. 11.

By: A. Dubey n, R. Cammarota* & A. Aysu n

author keywords: Masking; neural networks; side-channel attacks; model stealing
topics (OpenAlex): Adversarial Robustness in Machine Learning; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
TL;DR: This work proposes the first fully-masked neural network inference engine design and improves the traditional Trichina's AND gates by adding pipelining elements for better glitch-resistance and architecting the whole design to sustain a throughput of 1 masked addition per cycle. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 30, 2021

2020 conference paper

BoMaNet: Boolean masking of an entire neural network

Proceedings of the 39th International Conference on Computer-Aided Design, 1–9.

By: A. Dubey, R. Cammarota & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 chapter book

DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks

author keywords: Deep-learning; Power side-channels; Lattice-based key-exchange protocols
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
TL;DR: This paper proposes the first deep-learning based side-channel attacks on post-quantum key-exchange protocols and demonstrates single-trace deep-learning based attacks that outperform traditional attacks such as horizontal differential power analysis and template attacks by up to 900% and 25%, respectively. (via Semantic Scholar)
Sources: Crossref, ORCID
Added: October 4, 2021

2020 conference paper

DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks

International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS).

By: F. Aydin, P. Kashyap, S. Potluri, P. Franzon & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article proceedings

Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors

By: Q. Tan*, S. Potluri n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Neuroscience and Neural Engineering
Source: Crossref
Added: February 24, 2025

2020 conference paper

Efficacy of satisfiability-based attacks in the presence of circuit reverse-engineering errors

2020 IEEE International Symposium on Circuits and Systems (ISCAS), 1–5.

By: Q. Tan, S. Potluri & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article

Machine learning and hardware security

Regazzoni, F., Bhasin, S., Pour, A. A., Alshaer, I., Aydin, F., Aysu, A., … Yli-Mäyry, V. (2020, November 2). 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), Vol. 11.

author keywords: machine learning; hardware security
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques; Adversarial Robustness in Machine Learning
TL;DR: Novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks and practical model extraction attack based on electromagnetic side-channel measurements are demonstrated. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 30, 2021

2020 conference paper

Machine learning and hardware security: Challenges and opportunities

Proceedings of the 39th International Conference on Computer-Aided Design, 1–6.

By: F. Regazzoni, S. Bhasin, A. Pour, I. Alshaer, F. Aydin, A. Aysu, V. Beroulle, G. Di Natale ...

Source: ORCID
Added: February 23, 2026

2020 article proceedings

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection

By: A. Dubey n, R. Cammarota* & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 24, 2025

2020 conference paper

Maskednet: The first hardware inference engine aiming power side-channel protection

2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 197–208.

By: A. Dubey, R. Cammarota & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article

RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform

Karabulut, E., & Aysu, A. (2020, August 1).

By: E. Karabulut n & A. Aysu n

author keywords: Lattice-Based Cryptography; RISC-V; NTT
topics (OpenAlex): Cryptography and Data Security; Cryptography and Residue Arithmetic; Coding theory and cryptography
TL;DR: The proposed design is respectively 6x, 40x, and 3x more efficient than the baseline solution, Berkeley Out-of-Order Machine, and a prior HW/SW co-design, while providing the needed flexibility. (via Semantic Scholar)
Source: Web Of Science
Added: August 23, 2021

2020 conference paper

RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform

30th International Conference on Field-Programmable Logic (FPL).

By: E. Karabulut & A. Aysu

Source: ORCID
Added: February 23, 2026

2020 article proceedings

SeqL: Secure Scan-Locking for IP Protection

By: S. Potluri n, A. Aysu n & A. Kumar*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Cryptographic Implementations and Security
Source: Crossref
Added: February 24, 2025

2020 conference paper

Seql: Secure scan-locking for ip protection

2020 21st International Symposium on Quality Electronic Design (ISQED), 7–13.

By: S. Potluri, A. Aysu & A. Kumar

Source: ORCID
Added: February 23, 2026

2020 journal article

Trustworthy ai inference systems: An industry research view

ArXiv Preprint ArXiv:2008.04449.

By: R. Cammarota, M. Schunter, A. Rajan, F. Boemer, Á. Kiss, A. Treiber, C. Weinert, T. Schneider ...

Source: ORCID
Added: February 23, 2026

2019 conference paper

Fast and efficient implementation of lightweight crypto algorithm PRESENT on FPGA through processor instruction set extension

2019 IEEE East-West Design & Test Symposium (EWDTS), 1–5.

By: A. Varici, G. Saglam, S. Ipek, A. Yildiz, S. Gören, A. Aysu, D. Iskender, T. Aktemur, H. Ugurdag

Source: ORCID
Added: February 23, 2026

2019 article

High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems

Ozcan, E., & Aysu, A. (2019, December 17). IEEE Embedded Systems Letters.

By: E. Ozcan* & A. Aysu n

author keywords: Field programmable gate array (FPGA); hardware design; high-level synthesis (HLS); lattice-based cryptography; post-quantum cryptography
topics (OpenAlex): Cryptography and Residue Arithmetic; Coding theory and cryptography; Cryptographic Implementations and Security
TL;DR: A fast yet extensive design space exploration of NTT is demonstrated through the Vivado HLS tool, the shortcomings/challenges of optimized configurations are analyzed, and the results are quantitatively compared to software-based and hand-coded hardware designs. (via Semantic Scholar)
Source: Web Of Science
Added: January 4, 2021

2019 journal article

High-level synthesis of number-theoretic transform: A case study for future cryptosystems

IEEE Embedded Systems Letters, 12(4), 133–136.

By: E. Ozcan & A. Aysu

Source: ORCID
Added: February 23, 2026

2019 article

Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers

Aysu, A. (2019, May 13).

By: A. Aysu n

author keywords: education; hardware security; post-quantum cryptography; FPGA
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Physical Unclonable Functions (PUFs) and Hardware Security
TL;DR: A new graduate course on hardware security taught at North Carolina State University during Fall 2018 targets an audience with no background on cryptography or hardware vulnerabilities, and evolves into designing specialized hardware accelerators for post-quantum cryptography, executing sophisticated implementation attacks, and building countermeasures on such hardware designs. (via Semantic Scholar)
Source: Web Of Science
Added: July 29, 2019

2019 conference paper

Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers

Proceedings of the 2019 on Great Lakes Symposium on VLSI, 237–242.

By: A. Aysu

Source: ORCID
Added: February 23, 2026

2019 article proceedings

Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems

topics (OpenAlex): Advanced Malware Detection Techniques; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
Source: Crossref
Added: February 24, 2025

2019 conference paper

Using power-anomalies to counter evasive micro-architectural attacks in embedded systems

2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 111–120.

By: S. Wei, A. Aysu, M. Orshansky, A. Gerstlauer & M. Tiwari

Source: ORCID
Added: February 23, 2026

2018 article proceedings

Binary Ring-LWE hardware with power side-channel countermeasures

By: A. Aysu*, M. Orshansky* & M. Tiwari*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2018 conference paper

Binary Ring-LWE hardware with power side-channel countermeasures

2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1253–1258.

By: A. Aysu, M. Orshansky & M. Tiwari

Source: ORCID
Added: February 23, 2026

2018 article proceedings

Fresh re-keying with strong PUFs: A new approach to side-channel security

By: X. Xi*, A. Aysu* & M. Orshansky*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 24, 2025

2018 conference paper

Fresh re-keying with strong PUFs: A new approach to side-channel security

2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 118–125.

By: X. Xi, A. Aysu & M. Orshansky

Source: ORCID
Added: February 23, 2026

2018 article proceedings

Horizontal side-channel vulnerabilities of post-quantum key exchange protocols

By: A. Aysu*, Y. Tobah*, M. Tiwari*, A. Gerstlauer* & M. Orshansky*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: February 24, 2025

2018 conference paper

Horizontal side-channel vulnerabilities of post-quantum key exchange protocols

2018 IEEE international symposium on hardware oriented security and trust (HOST), 81–88.

By: A. Aysu, Y. Tobah, M. Tiwari, A. Gerstlauer & M. Orshansky

Source: ORCID
Added: February 23, 2026

2017 article proceedings

A new maskless debiasing method for lightweight physical unclonable functions

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Memory and Neural Computing; Integrated Circuits and Semiconductor Failure Analysis
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Crossref
Added: February 24, 2025

2017 conference paper

A new maskless debiasing method for lightweight physical unclonable functions

2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 134–139.

By: A. Aysu, Y. Wang, P. Schaumont & M. Orshansky

Source: ORCID
Added: February 23, 2026

2017 chapter book

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA

By: C. Huth*, A. Aysu*, J. Guajardo*, P. Duplys* & T. Güneysu*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Memory and Neural Computing
Source: Crossref
Added: February 24, 2025

2017 conference paper

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA

Information Security and Cryptology--ICISC 2016: 19th International Conference, Seoul, South Korea, November 30--December 2, 2016, Revised Selected Papers 19, 28–48.

By: C. Huth, A. Aysu, J. Guajardo, P. Duplys & T. Güneysu

Source: ORCID
Added: February 23, 2026

2017 article

Security protocols for unified near field communication infrastructures

By: X. Guo & A. Aysu

Source: ORCID
Added: February 23, 2026

2017 article

Statement of Research Interests

Https://Research.ece.ncsu.edu/Aaysu/Wp-Content/Uploads/Research_Statement.Pdf.

By: A. Aysu

Source: ORCID
Added: February 23, 2026

2016 article proceedings

A Design Method for Remote Integrity Checking of Complex PCBs

By: A. Aysu*, S. Gaddam*, H. Mandadi*, C. Pinto*, L. Wegryn* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Neuroscience and Neural Engineering
Source: Crossref
Added: February 24, 2025

2016 conference paper

A design method for remote integrity checking of complex PCBs

2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1517–1522.

By: A. Aysu, S. Gaddam, H. Mandadi, C. Pinto, L. Wegryn & P. Schaumont

Source: ORCID
Added: February 23, 2026

2016 journal article

Compact and low‐power ASIP design for lightweight PUF‐based authentication protocols

IET Information Security, 10(5), 232–241.

By: A. Aysu*, E. Gulcan*, D. Moriyama* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Memory and Neural Computing; Neuroscience and Neural Engineering
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Crossref, ORCID
Added: February 24, 2025

2016 thesis

Resource-constrained and resource-efficient modern cryptosystem design

(Doctoral Dissertation). Virginia Polytechnic Institute and State University.

By: A. Aysu

Sources: NC State University Libraries, ORCID
Added: July 21, 2025

2016 report

Security protocols for unified near field communication infrastructures

(US Patent No. 9497573 B2).

By: G. Xu & A. Aysu

Source: NC State University Libraries
Added: July 21, 2025

2016 article

Security protocols for unified near field communication infrastructures

Guo, X., & Aysu, A. (2016, November).

By: X. Guo & A. Aysu

Source: ORCID
Added: February 23, 2026

2015 chapter book

A Flexible and Compact Hardware Architecture for the SIMON Block Cipher

By: E. Gulcan*, A. Aysu* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2015 conference paper

A flexible and compact hardware architecture for the SIMON block cipher

Lightweight Cryptography for Security and Privacy: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers 3, 34–50.

By: E. Gulcan, A. Aysu & P. Schaumont

Source: ORCID
Added: February 23, 2026

2015 chapter book

BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications

By: E. Gulcan*, A. Aysu* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2015 conference paper

BitCryptor: Bit-serialized flexible crypto engine for lightweight applications

Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings 16, 329–346.

By: E. Gulcan, A. Aysu & P. Schaumont

Source: ORCID
Added: February 23, 2026

2015 chapter book

End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol

By: A. Aysu*, E. Gulcan*, D. Moriyama*, P. Schaumont* & M. Yung*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Steganography and Watermarking Techniques; Advanced Memory and Neural Computing
Source: Crossref
Added: February 24, 2025

2015 conference paper

End-to-end design of a PUF-based privacy preserving authentication protocol

Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings 17, 556–576.

By: A. Aysu, E. Gulcan, D. Moriyama, P. Schaumont & M. Yung

Source: ORCID
Added: February 23, 2026

2015 journal article

Hardware/software co-design of physical unclonable function based authentications on FPGAs

Microprocessors and Microsystems, 39(7), 589–597.

By: A. Aysu* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Neuroscience and Neural Engineering; Integrated Circuits and Semiconductor Failure Analysis
Sources: Crossref, ORCID
Added: February 24, 2025

2015 journal article

Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms

IEEE Transactions on Computers, 65(9), 2925–2931.

By: A. Aysu* & P. Schaumont*

topics (OpenAlex): Quantum Computing Algorithms and Architecture; Advanced Memory and Neural Computing; Quantum-Dot Cellular Automata
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2015 journal article

Precomputation methods for hash-based signatures on energy-harvesting platforms

IEEE Transactions on Computers, 65(9), 2925–2931.

By: A. Aysu & P. Schaumont

Source: ORCID
Added: February 23, 2026

2015 journal article

The Future of Real-Time Security

ACM Transactions on Embedded Computing Systems, 14(3), 1–18.

By: A. Aysu*, B. Yuce* & P. Schaumont*

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Cryptography and Residue Arithmetic
Sources: Crossref, NC State University Libraries
Added: February 24, 2025

2015 journal article

The future of real-time security: Latency-optimized lattice-based digital signatures

ACM Transactions on Embedded Computing Systems (TECS), 14(3), 1–18.

By: A. Aysu, B. Yuce & P. Schaumont

Source: ORCID
Added: February 23, 2026

2014 conference paper

A low power adaptive H. 264 video encoder hardware

2014 IEEE Fourth International Conference on Consumer Electronics Berlin (ICCE-Berlin), 395–399.

By: I. Hamzaoglu, A. Aysu & O. Ulusel

Source: ORCID
Added: February 23, 2026

2014 article proceedings

A low power adaptive H.264 video encoder hardware

By: I. Hamzaoglu*, A. Aysu* & O. Ulusel*

topics (OpenAlex): Video Coding and Compression Technologies; Advanced Data Compression Techniques; Advanced Vision and Imaging
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2014 article proceedings

Analyzing and eliminating the causes of fault sensitivity analysis

By: N. Ghalaty*, A. Aysu* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
13. Climate Action (OpenAlex)
Source: Crossref
Added: February 24, 2025

2014 conference paper

Analyzing and eliminating the causes of fault sensitivity analysis

2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6.

By: N. Ghalaty, A. Aysu & P. Schaumont

Source: ORCID
Added: February 23, 2026

2014 journal article

SIMON Says: Break Area Records of Block Ciphers on FPGAs

IEEE Embedded Systems Letters, 6(2), 37–40.

By: A. Aysu*, E. Gulcan* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques
Sources: Crossref, ORCID
Added: February 24, 2025

2013 article proceedings

Digital fingerprints for low-cost platforms using MEMS sensors

By: A. Aysu*, N. Ghalaty*, Z. Franklin*, M. Yali* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Memory and Neural Computing; Neuroscience and Neural Engineering
Source: Crossref
Added: February 24, 2025

2013 conference paper

Digital fingerprints for low-cost platforms using MEMS sensors

Proceedings of the Workshop on Embedded Systems Security, 1–6.

By: A. Aysu, N. Ghalaty, Z. Franklin, M. Yali & P. Schaumont

Source: ORCID
Added: February 23, 2026

2013 article proceedings

Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications

By: A. Aysu*, M. Sayinta & C. Cigla*

topics (OpenAlex): Advanced Vision and Imaging; Video Coding and Compression Technologies; Advanced Image Processing Techniques
Source: Crossref
Added: February 24, 2025

2013 conference paper

Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications

2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration (VLSI-SoC), 204–209.

By: A. Aysu, M. Sayinta & C. Cigla

Source: ORCID
Added: February 23, 2026

2013 article proceedings

Low-cost and area-efficient FPGA implementations of lattice-based cryptography

By: A. Aysu*, C. Patterson* & P. Schaumont*

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2013 conference paper

Low-cost and area-efficient FPGA implementations of lattice-based cryptography

2013 IEEE international symposium on hardware-oriented security and trust (HOST), 81–86.

By: A. Aysu, C. Patterson & P. Schaumont

Source: ORCID
Added: February 23, 2026

2013 article proceedings

PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs

By: A. Aysu* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Neuroscience and Neural Engineering; Integrated Circuits and Semiconductor Failure Analysis
Source: Crossref
Added: February 24, 2025

2013 conference paper

PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs

Reconfigurable Computing and FPGAs (ReConFig), 2013 International Conference on, 1–6.

By: A. Aysu & P. Schaumont

Source: ORCID
Added: February 23, 2026

2013 chapter book

Three Design Dimensions of Secure Embedded Systems

By: P. Schaumont* & A. Aysu*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Security and Verification in Computing
Source: Crossref
Added: February 24, 2025

2013 conference paper

Three design dimensions of secure embedded systems

Security, Privacy, and Applied Cryptography Engineering: Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings 3, 1–20.

By: P. Schaumont & A. Aysu

Source: ORCID
Added: February 23, 2026

2011 journal article

A low energy adaptive hardware for H.264 multiple reference frame motion estimation

IEEE Transactions on Consumer Electronics, 57(3), 1377–1383.

By: A. Aysu*, G. Sayilar* & I. Hamzaoglu*

topics (OpenAlex): Video Coding and Compression Technologies; Advanced Data Compression Techniques; Advanced Vision and Imaging
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Crossref, ORCID
Added: February 24, 2025

2011 conference paper

A reconfigurable H. 264 video encoder hardware

2011 IEEE 19th Signal Processing and Communications Applications Conference (SIU), 984–987.

By: I. Hamzaoglu, A. Aysu & O. Ulusel

Source: ORCID
Added: February 23, 2026

2011 article proceedings

A reconfigurable H.264 video encoder hardware

By: I. Hamzaoglu*, A. Aysu* & O. Ulusel*

topics (OpenAlex): Video Coding and Compression Technologies; Advanced Data Compression Techniques; Advanced Vision and Imaging
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2010 thesis

A baseline H.264 video encoder hardware design

(Master Thesis). Sabanci University.

By: A. Aysu

Source: NC State University Libraries
Added: July 21, 2025

2010 article proceedings

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing

Presented at the SIN '10: 3rd International Conference of Security of Information and Networks.

By: A. Akin*, A. Aysu*, O. Ulusel* & E. Savaş*

topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2010 conference paper

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single-and multi-message hashing

Proceedings of the 3rd International Conference on Security of Information and Networks, 168–177.

By: A. Akin, A. Aysu, O. Ulusel & E. Savaş

Source: ORCID
Added: February 23, 2026

journal article

2021 IEEE 39th International Conference on Computer Design (ICCD)| 978-1-6654-3219-1/21/$31.00̧opyright 2021 IEEE| DOI: 10.1109/ICCD53106. 2021.00099

Abella, J., Achyutha, S. M., Agostini, N. B., Ahmed, M. R., Aksanli, B., Alatoun, K. M., … others.

By: J. Abella, S. Achyutha, N. Agostini, M. Ahmed, B. Aksanli, K. Alatoun, M. Al-hayanni, S. Ali ...

Source: ORCID
Added: February 23, 2026

journal article

58th DAC TECHNICAL PROGRAM COMMITTEE

Abdelzaher, T., Acquaviva, A., Adegbija, T., Aftabjahani, S., Alaghi, A., Alamaldeen, A., … others.

By: T. Abdelzaher, A. Acquaviva, T. Adegbija, S. Aftabjahani, A. Alaghi, A. Alamaldeen, M. Alsafrjalani, L. Amaru ...

Source: ORCID
Added: February 23, 2026

journal article

A (Cont.)

Dubey, A., Lele, A., Aysu, A., Duisterhof, B. P., Yu, B., Wu, B.-X., … Plancher, B.

By: A. Dubey, A. Lele, A. Aysu, B. Duisterhof, B. Yu, B. Wu, B. Li, B. Taylor, B. Plancher

Source: ORCID
Added: February 23, 2026

journal article

Ender, Maik 159

Abuaita, T., Akhmatdinov, S., Anand, T., Andrews, D., Arikawa, Y., Arora, A., … others.

By: T. Abuaita, S. Akhmatdinov, T. Anand, D. Andrews, Y. Arikawa, A. Arora, A. Aysu, J. Bailey ...

Source: ORCID
Added: February 23, 2026

journal article

Ghayoor Abbas Gillani, University of Twente Kamila Abdiyeva, Nazarbayev University Muhammad Abdullah Hanif, New York University Abu Dhabi Morayo Adedjouma, French Alternative Energies and Atomic Energy Commission

Aghaie, A., Agosta, G., Ahmadi-Pour, S., Alouani, I., Alrahis, L., Autexier, S., … others.

By: A. Aghaie, G. Agosta, S. Ahmadi-Pour, I. Alouani, L. Alrahis, S. Autexier, A. Aysu, M. Baklouti ...

Source: ORCID
Added: February 23, 2026

Employment

Updated: January 15th, 2020 14:58

2018 - present

North Carolina State University Raleigh, NC, US
Assistant Professor Electrical and Computer Engineering

Education

Updated: May 12th, 2020 00:40

2016 - 2018

University of Texas at Austin Austin, TX, US
Postdoctoral Research Fellow

2012 - 2016

Virginia Tech Blacksburg, Virginia, US
PhD, Computer Engineering

2008 - 2010

Sabanci University Istanbul, TR
MSc of Electrical and Computer Engineering

2004 - 2008

Sabancı University Istanbul, TR
BSc, Microelectronics Engineering

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.