Works (167)
2026 article
A Comparison of Unified Multiplier Designs for the Falcon Post-quantum Digital Signature
Magesh, R., Ayyagari, M., Pendyala, S., & Aysu, A. (2026, January 1). Lecture Notes in Computer Science, Vol. 1.
2026 article
ASIC Tape-Out of the First Side-Channel Protected Neural Network Design
Dubey, A., Cammarota, R., & Aysu, A. (2026, January 1). IEEE Design and Test.
2026 article
Preemption-Enhanced Benchmark Suite for FPGAs
Malik, A. A., Buchanan, J., & Aysu, A. (2026, January 1). IEEE Access, Vol. 1.
2025 article
CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon
Malik, A. A., Mihir, H., & Aysu, A. (2025, October 17).
2025 journal article
Craft: Characterizing and root-causing fault injection threats at pre-silicon
ArXiv Preprint ArXiv:2503.03877.
2025 article proceedings
Exploiting Power Side-Channel Vulnerabilities in XGBoost Accelerator
2025 article proceedings
GateBleed: Exploiting On-Core Accelerator Power Gating for High Performance and Stealthy Attacks on AI
2025 article
Hardware-Enabled Mechanisms for Verifying Responsible AI Development
Aidan, O. G., Kulp, G., Hodgkins, W., Petrie, J., Immler, V., Aysu, A., … Srivastava, A. (2025, July 20). SuperIntelligence - Robotics - Safety & Alignment.
2025 journal article
Hardware-Enabled Mechanisms for Verifying Responsible AI Development
ArXiv Preprint ArXiv:2505.03742.
2025 journal article
Integrating Cybersecurity in K-12 Education Through Hybrid Experiential Professional Development for Middle and High School Teachers
Journal of Technology and Teacher Education, 33(4), 721–752.
2025 article
Machine Learning-Aided Detection of DoS Attacks in Power Systems using Side-Channel Monitoring
Khatua, R., Aysu, A., & Chakrabortty, A. (2025, October 26). (Vol. 10). Vol. 10.
2025 article
Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch
Malik, A. A., Aydin, F., & Aysu, A. (2025, October 14). (Vol. 10). Vol. 10.
2025 article
Quantum Leak: Timing Side-Channel Attacks on Cloud-Based Quantum Services
Lu, C., Telang, E., Aysu, A., & Basu, K. (2025, June 27).
2025 journal article
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis
Cryptology EPrint Archive.
2025 article
Side-Channel Aware Training for Commercial Machine Learning Accelerators
Dubey, A., & Aysu, A. (2025, May).
2025 journal article
Stochastic Training for Side-Channel Resilient AI
ArXiv Preprint ArXiv:2506.06597.
2025 article
THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs
Karabulut, E., Malik, A. A., Awad, A., & Aysu, A. (2025, May 5). IEEE Transactions on Computers, Vol. 5.
2025 journal article
THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs
IEEE Transactions on Computers.
2025 journal article
TPUXtract: An Exhaustive Hyperparameter Extraction Framework
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 78–103.
2025 article
The Fellowship of the Leak: Power Analysis of a Masked FrodoKEM Hardware Accelerator
Schmid, M., Manzoni, G., Aysu, A., & Kavun, E. B. (2025, October 26). (Vol. 10). Vol. 10.
2025 article
Timed Physical Password or Authentication Keys
Martin, A., Kiptoo, D. J., Kanoy, D. S., Li, S., Du, C., Kumar, M., … Thuo, M. (2025, May 16). ACS Applied Materials & Interfaces, Vol. 5.
2025 journal article
Timed Physical Password or Authentication Keys
ACS Applied Materials & Interfaces.
2024 article
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature
Karabulut, E., & Aysu, A. (2024, May 6).
2024 conference paper
A hardware-software co-design for the discrete gaussian sampling of falcon digital signature
2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 90–100.
2024 journal article
An Open Source Ecosystem for Implementation Security Testing
Cryptology EPrint Archive.
2024 journal article
Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems
Journal of Hardware and Systems Security, 8(2), 94–112.
Contributors: A. Malik n , E. Karabulut n, A. Awad n & n
2024 article
Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware
Aydin, F., Karabulut, E., & Aysu, A. (2024, June 10). (Vol. 6). Vol. 6.
2024 article
Leaking secrets in homomorphic encryption with side-channel attacks
Aydin, F., & Aysu, A. (2024, January 12). Journal of Cryptographic Engineering.
2024 journal article
Leaking secrets in homomorphic encryption with side-channel attacks
Journal of Cryptographic Engineering, 14(2), 241–251.
2024 journal article
Masking FALCON’s Floating-Point Multiplication in Hardware
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 483–508.
2024 article proceedings
Pre-Silicon Side-Channel Analysis of AI/ML Systems
2024 conference paper
Pre-Silicon Side-Channel Analysis of AI/ML Systems
2024 IEEE Physical Assurance and Inspection of Electronics (PAINE), 1–7.
2024 conference paper
Pre-silicon vulnerability assessment for AI/ML hardware
Proceedings of the Great Lakes Symposium on VLSI 2024, 495–495.
2024 journal article
Quantum leak: Timing side-channel attacks on cloud-based quantum services
ArXiv Preprint ArXiv:2401.01521.
2024 article
RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost
Gajjar, A., Kashyap, P., Aysu, A., Franzon, P., Choi, Y., Cheng, C., … Ignowski, J. (2024, August 12). ACM Transactions on Reconfigurable Technology and Systems, Vol. 8.
2024 journal article
RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost
ACM Transactions on Reconfigurable Technology and Systems, 17(4), 1–33.
2024 report
Side-Channel Aware Training for Commercial Machine Learning Accelerators
(US Patent Application No. 18/950,948).
2024 journal article
TPUXtract: An Exhaustive Hyperparameter Extraction Framework
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 78–103.
2024 journal article
Technology and Systems
ACM Transactions On, 17(4).
2023 article proceedings
A Full-Stack Approach for Side-Channel Secure ML Hardware
2023 conference paper
A Survey of Software Implementations for the Number Theoretic Transform
In C. Silvano, C. Pilato, & M. Reichenbach (Eds.), Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023 (pp. 328–344).
Ed(s): C. Silvano, C. Pilato & M. Reichenbach
2023 conference paper
A full-stack approach for side-channel secure ML hardware
2023 IEEE international test conference (ITC), 186–195.
2023 article
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference
Dubey, A., Cammarota, R., Varna, A., Kumar, R., & Aysu, A. (2023, May 1).
2023 journal article
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference
Cryptology EPrint Archive.
2023 journal article
Introduction to the Special Issue on the Digital Threats of Hardware Security
Digital Threats: Research and Practice, 4(2), 1–2.
2023 article
Introduction to the Special Issue on the Digital Threats of Hardware Security
Digital Threats: Research and Practice, Vol. 4, pp. 1–2. ACM New York, NY.
2023 article
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
Karabulut, E., Awad, A., & Aysu, A. (2023, May 21). (Vol. 5). Vol. 5.
2022 article
Apple vs. EMA
Haas, G., & Aysu, A. (2022, July 10). Proceedings of the 59th ACM/IEEE Design Automation Conference, Vol. 7.
2022 conference paper
Apple vs. EMA: electromagnetic side channel attacks on apple CoreCrypto
Proceedings of the 59th ACM/IEEE Design Automation Conference, 247–252.
2022 journal article
Better Performance, Higher Reliability, More Security: Research Highlights from the Center for Advanced Electronics through Machine Learning
Electronic Device Failure Analysis, 24(2), 34–36.
2022 article proceedings
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
2022 conference paper
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 95–100.
2022 article proceedings
FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS
2022 conference paper
FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS
2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), 1–9.
2022 article
Guarding Machine Learning Hardware Against Physical Side-channel Attacks
Dubey, A., Cammarota, R., Suresh, V., & Aysu, A. (2022, February 2). ACM Journal on Emerging Technologies in Computing Systems.
2022 journal article
Guarding machine learning hardware against physical side-channel attacks
ACM Journal on Emerging Technologies in Computing Systems (JETC), 18(3), 1–31.
2022 article proceedings
Hands-On Teaching of Hardware Security for Machine Learning
2022 conference paper
Hands-On Teaching of Hardware Security for Machine Learning
Proceedings of the Great Lakes Symposium on VLSI 2022, 455–461.
2022 article
High-Fidelity Model Extraction Attacks via Remote Power Monitors
Dubey, A., Karabulut, E., Awad, A., & Aysu, A. (2022, June 13). 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS).
2022 conference paper
High-Fidelity Model Extraction Attacks via Remote Power Monitors
2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS), 328–331.
2022 journal article
Modulonet: neural networks meet modular arithmetic for efficient hardware masking
IACR Transactions on Cryptographic Hardware and Embedded Systems, 506–556.
2022 conference paper
Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety
In F. Regazzoni & M. van Dijk (Eds.), CCSW'22: Proceedings of the 2022 on Cloud Computing Security Workshop (pp. 7–8).
Ed(s): F. Regazzoni & M. van Dijk
2022 article proceedings
PR Crisis
2022 conference paper
PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 101–106.
2022 article proceedings
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library
2022 conference paper
Reveal: Single-trace side-channel leakage of the seal homomorphic encryption library
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1527–1532.
2022 article
SeqL+: Secure Scan-Obfuscation With Theoretical and Empirical Validation
Potluri, S., Kundu, S., Kumar, A., Basu, K., & Aysu, A. (2022, August 15). IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 8.
2022 journal article
SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
2022 article
Towards AI-Enabled Hardware Security: Challenges and Opportunities
Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J., & Tehranipoor, S. (2022, September 12).
2022 conference paper
Towards AI-Enabled Hardware Security: Challenges and Opportunities
2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), 1–10.
2021 article
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Chen, Z., Karabulut, E., Aysu, A., Ma, Y., & Jing, J. (2021, October 1).
2021 conference paper
An efficient non-profiled side-channel attack on the CRYSTALS-Dilithium post-quantum signature
2021 IEEE 39th International Conference on Computer Design (ICCD), 583–590.
2021 journal article
Efficient, flexible, and constant-time gaussian sampling hardware for lattice cryptography
IEEE Transactions on Computers, 71(8), 1810–1823.
2021 article
Efficient,Flexible,and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography
Karabulut, E., Alkim, E., & Aysu, A. (2021, January 1). IEEE Transactions on Computers.
2021 article
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
Karabulut, E., & Aysu, A. (2021, November 8).
2021 conference paper
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks
Design Automation Conference (DAC).
2021 journal article
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols
ACM Transactions on Embedded Computing Systems, 20(6), 1–22.
2021 journal article
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
IACR Transactions on Cryptographic Hardware and Embedded Systems, 506–556.
2021 article
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM
Karabulut, E., Alkim, E., & Aysu, A. (2021, December 12).
2021 conference paper
Single-trace side-channel attacks on $ω$-small polynomial sampling: with applications to NTRU, NTRU prime, and crystals-dilithium
2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 35–45.
2021 article
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Potluri, S., & Aysu, A. (2021, November 1). 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD).
2021 journal article
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
2021 article
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Haas, G., Potluri, S., & Aysu, A. (2021, December 12).
2021 journal article
iTimed: Cache Attacks on the Apple A10 Fusion SoC
2020 article
2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning
Kashyap, P., Aydin, F., Potluri, S., Franzon, P. D., & Aysu, A. (2020, November 17). IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 6, pp. 1–1.
2020 journal article
2deep: Enhancing side-channel attacks on lattice-based key-exchange via 2-d deep learning
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 40(6), 1217–1229.
2020 article proceedings
A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography
2020 conference paper
A flexible and scalable NTT hardware: Applications from homomorphically encrypted deep learning to post-quantum cryptography
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 346–351.
2020 article
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform
Mert, A. C., Karabulut, E., Ozturk, E., Savas, E., & Aysu, A. (2020, August 19). IEEE Transactions on Computers, Vol. 8.
2020 journal article
An extensive study of flexible design methods for the number theoretic transform
IEEE Transactions on Computers, 71(11), 2829–2843.
2020 article
BoMaNet
Dubey, A., Cammarota, R., & Aysu, A. (2020, November 2). (Vol. 11). Vol. 11.
2020 conference paper
BoMaNet: Boolean masking of an entire neural network
Proceedings of the 39th International Conference on Computer-Aided Design, 1–9.
2020 chapter book
DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks
2020 conference paper
DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks
International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS).
2020 article proceedings
Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors
2020 conference paper
Efficacy of satisfiability-based attacks in the presence of circuit reverse-engineering errors
2020 IEEE International Symposium on Circuits and Systems (ISCAS), 1–5.
2020 article
Machine learning and hardware security
Regazzoni, F., Bhasin, S., Pour, A. A., Alshaer, I., Aydin, F., Aysu, A., … Yli-Mäyry, V. (2020, November 2). 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), Vol. 11.
2020 conference paper
Machine learning and hardware security: Challenges and opportunities
Proceedings of the 39th International Conference on Computer-Aided Design, 1–6.
2020 article proceedings
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection
2020 conference paper
Maskednet: The first hardware inference engine aiming power side-channel protection
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 197–208.
2020 article
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform
Karabulut, E., & Aysu, A. (2020, August 1).
2020 conference paper
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform
30th International Conference on Field-Programmable Logic (FPL).
2020 article proceedings
SeqL: Secure Scan-Locking for IP Protection
2020 conference paper
Seql: Secure scan-locking for ip protection
2020 21st International Symposium on Quality Electronic Design (ISQED), 7–13.
2020 journal article
Trustworthy ai inference systems: An industry research view
ArXiv Preprint ArXiv:2008.04449.
2019 conference paper
Fast and efficient implementation of lightweight crypto algorithm PRESENT on FPGA through processor instruction set extension
2019 IEEE East-West Design & Test Symposium (EWDTS), 1–5.
2019 article
High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems
Ozcan, E., & Aysu, A. (2019, December 17). IEEE Embedded Systems Letters.
2019 journal article
High-level synthesis of number-theoretic transform: A case study for future cryptosystems
IEEE Embedded Systems Letters, 12(4), 133–136.
2019 article
Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers
Aysu, A. (2019, May 13).
2019 conference paper
Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 237–242.
2019 article proceedings
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems
2019 conference paper
Using power-anomalies to counter evasive micro-architectural attacks in embedded systems
2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 111–120.
2018 article proceedings
Binary Ring-LWE hardware with power side-channel countermeasures
2018 conference paper
Binary Ring-LWE hardware with power side-channel countermeasures
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1253–1258.
2018 article proceedings
Fresh re-keying with strong PUFs: A new approach to side-channel security
2018 conference paper
Fresh re-keying with strong PUFs: A new approach to side-channel security
2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 118–125.
2018 article proceedings
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols
2018 conference paper
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols
2018 IEEE international symposium on hardware oriented security and trust (HOST), 81–88.
2017 article proceedings
A new maskless debiasing method for lightweight physical unclonable functions
2017 conference paper
A new maskless debiasing method for lightweight physical unclonable functions
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 134–139.
2017 chapter book
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
2017 conference paper
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
Information Security and Cryptology--ICISC 2016: 19th International Conference, Seoul, South Korea, November 30--December 2, 2016, Revised Selected Papers 19, 28–48.
2017 article
Security protocols for unified near field communication infrastructures
2017 article
Statement of Research Interests
Https://Research.ece.ncsu.edu/Aaysu/Wp-Content/Uploads/Research_Statement.Pdf.
2016 article proceedings
A Design Method for Remote Integrity Checking of Complex PCBs
2016 conference paper
A design method for remote integrity checking of complex PCBs
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1517–1522.
2016 journal article
Compact and low‐power ASIP design for lightweight PUF‐based authentication protocols
IET Information Security, 10(5), 232–241.
2016 thesis
Resource-constrained and resource-efficient modern cryptosystem design
(Doctoral Dissertation). Virginia Polytechnic Institute and State University.
2016 report
Security protocols for unified near field communication infrastructures
(US Patent No. 9497573 B2).
2016 article
Security protocols for unified near field communication infrastructures
Guo, X., & Aysu, A. (2016, November).
2015 chapter book
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
2015 conference paper
A flexible and compact hardware architecture for the SIMON block cipher
Lightweight Cryptography for Security and Privacy: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers 3, 34–50.
2015 chapter book
BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
2015 conference paper
BitCryptor: Bit-serialized flexible crypto engine for lightweight applications
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings 16, 329–346.
2015 chapter book
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
2015 conference paper
End-to-end design of a PUF-based privacy preserving authentication protocol
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings 17, 556–576.
2015 journal article
Hardware/software co-design of physical unclonable function based authentications on FPGAs
Microprocessors and Microsystems, 39(7), 589–597.
2015 journal article
Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms
IEEE Transactions on Computers, 65(9), 2925–2931.
2015 journal article
Precomputation methods for hash-based signatures on energy-harvesting platforms
IEEE Transactions on Computers, 65(9), 2925–2931.
2015 journal article
The Future of Real-Time Security
ACM Transactions on Embedded Computing Systems, 14(3), 1–18.
2015 journal article
The future of real-time security: Latency-optimized lattice-based digital signatures
ACM Transactions on Embedded Computing Systems (TECS), 14(3), 1–18.
2014 conference paper
A low power adaptive H. 264 video encoder hardware
2014 IEEE Fourth International Conference on Consumer Electronics Berlin (ICCE-Berlin), 395–399.
2014 article proceedings
A low power adaptive H.264 video encoder hardware
2014 article proceedings
Analyzing and eliminating the causes of fault sensitivity analysis
2014 conference paper
Analyzing and eliminating the causes of fault sensitivity analysis
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6.
2014 journal article
SIMON Says: Break Area Records of Block Ciphers on FPGAs
IEEE Embedded Systems Letters, 6(2), 37–40.
2013 article proceedings
Digital fingerprints for low-cost platforms using MEMS sensors
2013 conference paper
Digital fingerprints for low-cost platforms using MEMS sensors
Proceedings of the Workshop on Embedded Systems Security, 1–6.
2013 article proceedings
Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications
2013 conference paper
Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications
2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration (VLSI-SoC), 204–209.
2013 article proceedings
Low-cost and area-efficient FPGA implementations of lattice-based cryptography
2013 conference paper
Low-cost and area-efficient FPGA implementations of lattice-based cryptography
2013 IEEE international symposium on hardware-oriented security and trust (HOST), 81–86.
2013 article proceedings
PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs
2013 conference paper
PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs
Reconfigurable Computing and FPGAs (ReConFig), 2013 International Conference on, 1–6.
2013 chapter book
Three Design Dimensions of Secure Embedded Systems
2013 conference paper
Three design dimensions of secure embedded systems
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings 3, 1–20.
2011 journal article
A low energy adaptive hardware for H.264 multiple reference frame motion estimation
IEEE Transactions on Consumer Electronics, 57(3), 1377–1383.
2011 conference paper
A reconfigurable H. 264 video encoder hardware
2011 IEEE 19th Signal Processing and Communications Applications Conference (SIU), 984–987.
2011 article proceedings
A reconfigurable H.264 video encoder hardware
2010 thesis
A baseline H.264 video encoder hardware design
(Master Thesis). Sabanci University.
2010 article proceedings
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing
Presented at the SIN '10: 3rd International Conference of Security of Information and Networks.
2010 conference paper
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single-and multi-message hashing
Proceedings of the 3rd International Conference on Security of Information and Networks, 168–177.
journal article
2021 IEEE 39th International Conference on Computer Design (ICCD)| 978-1-6654-3219-1/21/$31.00̧opyright 2021 IEEE| DOI: 10.1109/ICCD53106. 2021.00099
Abella, J., Achyutha, S. M., Agostini, N. B., Ahmed, M. R., Aksanli, B., Alatoun, K. M., … others.
journal article
58th DAC TECHNICAL PROGRAM COMMITTEE
Abdelzaher, T., Acquaviva, A., Adegbija, T., Aftabjahani, S., Alaghi, A., Alamaldeen, A., … others.
journal article
A (Cont.)
Dubey, A., Lele, A., Aysu, A., Duisterhof, B. P., Yu, B., Wu, B.-X., … Plancher, B.
journal article
Ender, Maik 159
Abuaita, T., Akhmatdinov, S., Anand, T., Andrews, D., Arikawa, Y., Arora, A., … others.
journal article
Ghayoor Abbas Gillani, University of Twente Kamila Abdiyeva, Nazarbayev University Muhammad Abdullah Hanif, New York University Abu Dhabi Morayo Adedjouma, French Alternative Energies and Atomic Energy Commission
Aghaie, A., Agosta, G., Ahmadi-Pour, S., Alouani, I., Alrahis, L., Autexier, S., … others.
Employment
Updated: January 15th, 2020 14:58
2018 - present
Education
Updated: May 12th, 2020 00:40
2016 - 2018
2012 - 2016
2008 - 2010
2004 - 2008