Works (70)

Updated: March 29th, 2025 05:03

2024 article

A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature

2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 90–100.

By: E. Karabulut n & A. Aysu n

author keywords: discrete Gaussian sampling; hardware-software co-design; post-quantum cryptography; digital signatures; FPGA
topics (OpenAlex): Embedded Systems Design Techniques; Digital Image Processing Techniques
Source: Web Of Science
Added: July 30, 2024

2024 journal article

Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems

Journal of Hardware and Systems Security, 8(2), 94–112.

topics (OpenAlex): Cryptographic Implementations and Security; Security and Verification in Computing; Advanced Malware Detection Techniques
Source: Crossref
Added: February 3, 2025

2024 article

Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware

PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, pp. 495–495.

By: F. Aydin n, E. Karabulut n & A. Aysu n

author keywords: Pre-silicon; Side-channel analysis; pre-silicon validation; AI/ML hardware
topics (OpenAlex): Adversarial Robustness in Machine Learning; Security and Verification in Computing; Radiation Effects in Electronics
Source: Web Of Science
Added: August 26, 2024

2024 article

Leaking secrets in homomorphic encryption with side-channel attacks

Aydin, F., & Aysu, A. (2024, January 12). JOURNAL OF CRYPTOGRAPHIC ENGINEERING.

By: F. Aydin n & A. Aysu n

author keywords: Homomorphic encryption; SEAL; Number theoretic transform; Compiler optimizations; Side-channel attacks; Machine learning
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Cryptography and Data Security
TL;DR: This article demonstrates side-channel leakages of the Microsoft SEAL HE library and proposes two attacks that can steal encryption keys during the key generation phase by abusing the leakage of ternary value assignments that occurs during the number theoretic transform (NTT) algorithm. (via Semantic Scholar)
Source: Web Of Science
Added: January 29, 2024

2024 journal article

Masking FALCON’s Floating-Point Multiplication in Hardware

IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 483–508.

By: E. Karabulut & A. Aysu*

topics (OpenAlex): Numerical Methods and Algorithms; Digital Filter Design and Implementation; Parallel Computing and Optimization Techniques
Source: Crossref
Added: February 3, 2025

2024 article proceedings

Pre-Silicon Side-Channel Analysis of AI/ML Systems

By: F. Aydin n, E. Karabulut n & A. Aysu n

author keywords: Pre-silicon; Side-channel analysis; Differential power analysis; Machine learning; RISC-V
topics (OpenAlex): Embedded Systems Design Techniques; Radiation Effects in Electronics
Sources: Crossref, Web Of Science
Added: February 3, 2025

2024 journal article

RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost

ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 17(4).

author keywords: FPGAs; XGBoost; Binary Classification; High-Level Synthesis; Ransomware; Hardware Performance Counters; Accelerators; Machine Learning
topics (OpenAlex): Advanced Malware Detection Techniques; Network Security and Intrusion Detection; Digital and Cyber Forensics
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 15, 2024

2024 journal article

TPUXtract: An Exhaustive Hyperparameter Extraction Framework

IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 78–103.

By: A. Kurian n, A. Dubey n, F. Yaman n & A. Aysu n

topics (OpenAlex): Machine Learning and Data Classification
Source: Crossref
Added: February 3, 2025

2023 article proceedings

A Full-Stack Approach for Side-Channel Secure ML Hardware

By: A. Dubey n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
Source: Crossref
Added: February 3, 2025

2023 conference paper

A Survey of Software Implementations for the Number Theoretic Transform

In C. Silvano, C. Pilato, & M. Reichenbach (Eds.), Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023 (pp. 328–344).

By: A. Mert*, F. Yaman n, E. Karabulut n, E. Ozturk*, E. Savas* & A. Aysu n

Ed(s): C. Silvano, C. Pilato & M. Reichenbach

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Cryptography and Residue Arithmetic
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: NC State University Libraries
Added: February 10, 2025

2023 article

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference

2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 155–166.

author keywords: machine learning inference; side-channel analysis; masking; flexibility
topics (OpenAlex): Cryptographic Implementations and Security; Security and Verification in Computing; Advanced Malware Detection Techniques
TL;DR: This paper develops a secure RISCV-based coprocessor design that can execute a neural network implemented in C/C++ that uses masking to execute various neural network operations like weighted summations, activation functions, and output layer computation in a sidechannel secure fashion. (via Semantic Scholar)
Source: Web Of Science
Added: August 7, 2023

2023 journal article

Introduction to the Special Issue on the Digital Threats of Hardware Security

Digital Threats: Research and Practice, 4(2), 1–2.

By: A. Aysu n & S. Graham*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 3, 2025

2023 article

SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs

2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.

By: E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Multi-tenant cloud FPGAs; access control mechanism; memory isolation
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing; Cryptographic Implementations and Security
TL;DR: This paper proposes an improved access control mechanism for multi-tenant cloud FPGAs that allows dynamic configuration of access control privileges and has three advantages: enabling secure resource sharing of on-chip BRAMs to tenants, enabling safe sharing by resolving deadlocks and faulty access requests, and improvement in latency and throughput. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2023 journal article

SeqL plus : Secure Scan-Obfuscation With Theoretical and Empirical Validation

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 42(5), 1406–1410.

author keywords: Flip-flops; Logic gates; Security; Complexity theory; Resists; Resilience; Iterative algorithms; IP piracy; scan-chains; scan-scrambling
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Neuroscience and Neural Engineering
TL;DR: This study reveals the first formulation and complexity analysis of Boolean satisfiability (SAT)-based attack on scan-scrambling and proposes an iterative swapping-based scan-cell scrambling algorithm to defeat SAT-based attack. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: June 5, 2023

2022 journal article

An Extensive Study of Flexible Design Methods for the Number Theoretic Transform

IEEE TRANSACTIONS ON COMPUTERS, 71(11), 2829–2843.

author keywords: NTT; flexible; hardware; HLS; RISC-V
topics (OpenAlex): Cryptographic Implementations and Security; Coding theory and cryptography; Cryptography and Residue Arithmetic
TL;DR: An extensive study of flexible design methods for NTT implementation by evaluating three cases: parametric hardware design, high-level synthesis (HLS) design approach, and design for software implementation compiled on soft-core processors, where all are targeted on reconfigurable hardware devices. (via Semantic Scholar)
Source: Web Of Science
Added: October 24, 2022

2022 article

Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto

PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252.

By: G. Haas n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Security and Verification in Computing; Chaos-based Image/Signal Encryption
TL;DR: This work implements an optimized side channel acquisition infrastructure involving both custom iPhone software and accelerated analysis code and finds that an adversary which can observe 5--30 million known-ciphertext traces can reliably extract secret AES keys using electromagnetic (EM) radiation as a side channel. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2022 journal article

Better Performance, Higher Reliability, More Security: Research Highlights from the Center for Advanced Electronics through Machine Learning

Electronic Device Failure Analysis, 24(2), 34–36.

By: A. Aysu, X. Chen, W. Davis, S. Lim, P. Franzon, M. Swaminathan, E. Rosenbaum

Source: NC State University Libraries
Added: February 10, 2025

2022 article proceedings

Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library

By: F. Aydin n & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Cryptography and Data Security; Security and Verification in Computing
Source: Crossref
Added: February 3, 2025

2022 article proceedings

FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS

By: A. Gajjar n, P. Kashyap n, A. Aysu n, P. Franzon n, S. Dey* & C. Cheng*

Event: 2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)

topics (OpenAlex): Advanced Malware Detection Techniques; Adversarial Robustness in Machine Learning; Advanced Neural Network Applications
TL;DR: An FPGA-based XGBoost accelerator designed with High-Level Synthesis (HLS) tools and design flow accelerating binary classification inference is showcased, showing a latency speedup of the proposed design over state-of-art CPU and GPU implementations, including energy efficiency and cost-effectiveness. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, NC State University Libraries, ORCID, Crossref
Added: October 11, 2022

2022 journal article

Guarding Machine Learning Hardware Against Physical Side-channel Attacks

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 18(3).

author keywords: Side-channel attack; neural networks; masking
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: This work develops and combines different flavors of side-channel defenses for ML models in the hardware blocks and proposes and optimize the first defense based on Boolean masking, which impedes a straightforward second-order attack on the first-order masked implementation. (via Semantic Scholar)
Source: Web Of Science
Added: December 5, 2022

2022 article proceedings

Hands-On Teaching of Hardware Security for Machine Learning

By: A. Calhoun n, E. Ortega n, F. Yaman n, A. Dubey n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 3, 2025

2022 article

High-Fidelity Model Extraction Attacks via Remote Power Monitors

2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.

By: A. Dubey n, E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Neural networks; model stealing; time-to-digital converters; secure virtualization
topics (OpenAlex): Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: It is demonstrated that a remote monitor implemented with time-to-digital converters can be exploited to steal the weights from a hardware implementation of NN inference, which expands the attack vector to multi-tenant cloud FPGA platforms. (via Semantic Scholar)
Source: Web Of Science
Added: November 7, 2022

2022 conference paper

Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety

In F. Regazzoni & M. van Dijk (Eds.), CCSW'22: Proceedings of the 2022 on Cloud Computing Security Workshop (pp. 7–8).

By: A. Aysu n

Ed(s): F. Regazzoni & M. van Dijk

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Radiation Effects in Electronics
Source: NC State University Libraries
Added: February 10, 2025

2022 article proceedings

PR Crisis

By: E. Karabulut n, C. Yuvarajappa n, M. Shaik n, S. Potluri n, A. Awad n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 3, 2025

2022 article proceedings

RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library

topics (OpenAlex): Cryptographic Implementations and Security; Cryptography and Data Security; Coding theory and cryptography
Source: Crossref
Added: February 3, 2025

2022 article

Towards AI-Enabled Hardware Security: Challenges and Opportunities

2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022).

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing; Advanced Malware Detection Techniques
TL;DR: The growing role of AI/ML techniques in hardware and architecture security field is highlighted and insightful discussions on pressing challenges, opportunities, and future directions of designing accurate and efficient machine learning-based attacks and defense mechanisms in response to emerging hardware security vulnerabilities in modern computer systems and next generation of cryptosystems are provided. (via Semantic Scholar)
Source: Web Of Science
Added: October 24, 2022

2021 journal article

2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 40(6), 1217–1229.

By: P. Kashyap n, F. Aydin n, S. Potluri n, P. Franzon n & A. Aysu n

author keywords: Resistance; Performance evaluation; Deep learning; Protocols; Power measurement; Side-channel attacks; NIST; Cross-device; data-augmentation; deep learning (DL); lattice-based key-exchange protocols; power side channels
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: 2Deep—a deep-learning (DL)-based SCA—targeting parallelized implementations of PQKE protocols, namely, Frodo and NewHope with data augmentation techniques are proposed, exploring approaches that convert 1-D time-series power measurement data into 2-D images to formulate SCA an image recognition task. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: June 10, 2021

2021 article

An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature

2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), pp. 583–590.

By: Z. Chen*, E. Karabulut n, A. Aysu n, Y. Ma* & J. Jing*

author keywords: Hardware Security; Post-quantum Cryptography; Correlation Power Analysis; Digital Signature; Number Theoretic Transform
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
TL;DR: This work proposes an efficient non-profiled Correlation Power Analysis (CPA) strategy on Dilithium to recover the secret key by targeting the underlying polynomial multiplication arithmetic and constructs a hybrid scheme that combines the advantages of both schemes. (via Semantic Scholar)
Source: Web Of Science
Added: March 28, 2022

2021 journal article

Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography

IEEE TRANSACTIONS ON COMPUTERS, 71(8), 1810–1823.

By: E. Karabulut n, E. Alkim* & A. Aysu n

author keywords: Hardware; Cryptography; Gaussian distribution; Standards; Timing; Optimization; Encryption; Discrete gaussian sampling; lattice cryptography; FPGA
topics (OpenAlex): Cryptography and Data Security; Chaos-based Image/Signal Encryption; graph theory and CDMA systems
TL;DR: The proposed hardware can support all the discrete Gaussian distributions used in post-quantum digital signatures and key encapsulation algorithms, the homomorphic encryption library of SEAL, and other algorithms such BLISS digital signature and LP public-key encryption. (via Semantic Scholar)
Source: Web Of Science
Added: July 18, 2022

2021 article

FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks

2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), pp. 691–696.

By: E. Karabulut n & A. Aysu n

author keywords: side-channel attacks; post-quantum cryptography; digital signatures
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
TL;DR: The first side-channel attack on FALCON—a NIST Round-3 finalist for the post-quantum digital signature standard—is proposed and a known-plaintext attack that uses the electromagnetic measurements of the device to extract the secret signing keys, which then can be used to forge signatures on arbitrary messages. (via Semantic Scholar)
Source: Web Of Science
Added: March 28, 2022

2021 journal article

Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols

ACM Transactions on Embedded Computing Systems, 20(6), 1–22.

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: February 24, 2025

2021 journal article

ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking

IACR Transactions on Cryptographic Hardware and Embedded Systems, 506–556.

topics (OpenAlex): Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis
Source: Crossref
Added: February 3, 2025

2021 article

Single-Trace Side-Channel Attacks on omega-Small Polynomial Sampling

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 35–45.

By: E. Karabulut n, E. Alkim* & A. Aysu n

author keywords: Side-channel attacks; Post-quantum cryptography; NTRU; CRYSTALS-DILITHIUM
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
TL;DR: A new single-trace side-channel attack on lattice-based post-quantum protocols is proposed, revealing that the sorting implementation in NTRU/NTRU Prime and the shuffling in CRYSTALS-DILITHIUM's ω-small polynomial sampling process leaks information about the ‘-1’’0’, or ’+1' assignments made to the coefficients. (via Semantic Scholar)
Source: Web Of Science
Added: June 13, 2022

2021 article

Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware

2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD).

By: S. Potluri n & A. Aysu n

topics (OpenAlex): Adversarial Robustness in Machine Learning; Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis
TL;DR: This paper shows a new style of attack, for the first time, on ML models running on embedded devices by abusing the scan-chain infrastructure, and outperforms mathematical model extraction proposed in CRYPTO 2020, USENIX 2020, and ICML 2020. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: February 21, 2022

2021 article

iTimed: Cache Attacks on the Apple A10 Fusion SoC

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 80–90.

By: G. Haas n, S. Potluri n & A. Aysu n

topics (OpenAlex): Security and Verification in Computing; Parallel Computing and Optimization Techniques; Advanced Malware Detection Techniques
TL;DR: It is found that the first cache timing side-channel attack on one of Apple's mobile devices can reduce the security of OpenSSL AES-128 by 50 more bits than a straightforward adaptation of PRIME+PROBE, while requiring only half as many side channel measurement traces. (via Semantic Scholar)
Source: Web Of Science
Added: June 13, 2022

2020 article proceedings

A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography

topics (OpenAlex): Cryptography and Data Security; Cryptography and Residue Arithmetic; Coding theory and cryptography
Source: Crossref
Added: March 2, 2025

2020 article

BoMaNet: Boolean Masking of an Entire Neural Network

2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).

By: A. Dubey n, R. Cammarota* & A. Aysu n

author keywords: Masking; neural networks; side-channel attacks; model stealing
topics (OpenAlex): Adversarial Robustness in Machine Learning; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
TL;DR: This work proposes the first fully-masked neural network inference engine design and improves the traditional Trichina's AND gates by adding pipelining elements for better glitch-resistance and architecting the whole design to sustain a throughput of 1 masked addition per cycle. (via Semantic Scholar)
Source: Web Of Science
Added: August 30, 2021

2020 chapter book

DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks

author keywords: Deep-learning; Power side-channels; Lattice-based key-exchange protocols
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
TL;DR: This paper proposes the first deep-learning based side-channel attacks on post-quantum key-exchange protocols and demonstrates single-trace deep-learning based attacks that outperform traditional attacks such as horizontal differential power analysis and template attacks by up to 900% and 25%, respectively. (via Semantic Scholar)
Sources: Crossref, ORCID
Added: October 4, 2021

2020 article proceedings

Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors

By: Q. Tan*, S. Potluri n & A. Aysu n

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Neuroscience and Neural Engineering
Source: Crossref
Added: February 24, 2025

2020 journal article

High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems

IEEE EMBEDDED SYSTEMS LETTERS, 12(4), 133–136.

By: E. Ozcan* & A. Aysu n

author keywords: Field programmable gate array (FPGA); hardware design; high-level synthesis (HLS); lattice-based cryptography; post-quantum cryptography
topics (OpenAlex): Cryptography and Residue Arithmetic; Coding theory and cryptography; Cryptographic Implementations and Security
TL;DR: A fast yet extensive design space exploration of NTT is demonstrated through the Vivado HLS tool, the shortcomings/challenges of optimized configurations are analyzed, and the results are quantitatively compared to software-based and hand-coded hardware designs. (via Semantic Scholar)
Source: Web Of Science
Added: January 4, 2021

2020 article

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk

2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).

author keywords: machine learning; hardware security
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques; Adversarial Robustness in Machine Learning
TL;DR: Novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks and practical model extraction attack based on electromagnetic side-channel measurements are demonstrated. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 30, 2021

2020 article proceedings

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection

By: A. Dubey n, R. Cammarota* & A. Aysu n

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 24, 2025

2020 article

RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform

2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), pp. 26–32.

By: E. Karabulut n & A. Aysu n

author keywords: Lattice-Based Cryptography; RISC-V; NTT
topics (OpenAlex): Cryptography and Data Security; Cryptography and Residue Arithmetic; Coding theory and cryptography
TL;DR: The proposed design is respectively 6x, 40x, and 3x more efficient than the baseline solution, Berkeley Out-of-Order Machine, and a prior HW/SW co-design, while providing the needed flexibility. (via Semantic Scholar)
Source: Web Of Science
Added: August 23, 2021

2020 article proceedings

SeqL: Secure Scan-Locking for IP Protection

By: S. Potluri n, A. Aysu n & A. Kumar*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Cryptographic Implementations and Security
Source: Crossref
Added: February 24, 2025

2019 article

Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers

GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, pp. 237–242.

By: A. Aysu n

author keywords: education; hardware security; post-quantum cryptography; FPGA
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Physical Unclonable Functions (PUFs) and Hardware Security
TL;DR: A new graduate course on hardware security taught at North Carolina State University during Fall 2018 targets an audience with no background on cryptography or hardware vulnerabilities, and evolves into designing specialized hardware accelerators for post-quantum cryptography, executing sophisticated implementation attacks, and building countermeasures on such hardware designs. (via Semantic Scholar)
Source: Web Of Science
Added: July 29, 2019

2019 article proceedings

Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems

topics (OpenAlex): Advanced Malware Detection Techniques; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
Source: Crossref
Added: February 24, 2025

2018 article proceedings

Binary Ring-LWE hardware with power side-channel countermeasures

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2018 article proceedings

Fresh re-keying with strong PUFs: A new approach to side-channel security

By: X. Xi*, A. Aysu* & M. Orshansky*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 24, 2025

2018 article proceedings

Horizontal side-channel vulnerabilities of post-quantum key exchange protocols

By: A. Aysu*, Y. Tobah*, M. Tiwari*, A. Gerstlauer* & M. Orshansky*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Chaos-based Image/Signal Encryption
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: February 24, 2025

2017 article proceedings

A new maskless debiasing method for lightweight physical unclonable functions

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Memory and Neural Computing; Integrated Circuits and Semiconductor Failure Analysis
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Crossref
Added: February 24, 2025

2017 chapter book

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA

By: C. Huth*, A. Aysu*, J. Guajardo*, P. Duplys* & T. Güneysu*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Advanced Memory and Neural Computing
Source: Crossref
Added: February 24, 2025

2016 article proceedings

A Design Method for Remote Integrity Checking of Complex PCBs

By: A. Aysu*, S. Gaddam*, H. Mandadi*, C. Pinto*, L. Wegryn* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Integrated Circuits and Semiconductor Failure Analysis; Neuroscience and Neural Engineering
Source: Crossref
Added: February 24, 2025

2016 journal article

Compact and low‐power ASIP design for lightweight PUF‐based authentication protocols

IET Information Security, 10(5), 232–241.

By: A. Aysu*, E. Gulcan*, D. Moriyama* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Memory and Neural Computing; Neuroscience and Neural Engineering
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2016 journal article

Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms

IEEE Transactions on Computers, 65(9), 2925–2931.

By: A. Aysu* & P. Schaumont*

topics (OpenAlex): Quantum Computing Algorithms and Architecture; Advanced Memory and Neural Computing; Quantum-Dot Cellular Automata
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2015 chapter book

A Flexible and Compact Hardware Architecture for the SIMON Block Cipher

By: E. Gulcan*, A. Aysu* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2015 chapter book

BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications

By: E. Gulcan*, A. Aysu* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2015 chapter book

End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol

By: A. Aysu*, E. Gulcan*, D. Moriyama*, P. Schaumont* & M. Yung*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Steganography and Watermarking Techniques; Advanced Memory and Neural Computing
Source: Crossref
Added: February 24, 2025

2015 journal article

Hardware/software co-design of physical unclonable function based authentications on FPGAs

Microprocessors and Microsystems, 39(7), 589–597.

By: A. Aysu* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Neuroscience and Neural Engineering; Integrated Circuits and Semiconductor Failure Analysis
Source: Crossref
Added: February 24, 2025

2015 journal article

The Future of Real-Time Security

ACM Transactions on Embedded Computing Systems, 14(3), 1–18.

By: A. Aysu*, B. Yuce* & P. Schaumont*

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Cryptography and Residue Arithmetic
Source: Crossref
Added: February 24, 2025

2014 article proceedings

A low power adaptive H.264 video encoder hardware

By: I. Hamzaoglu*, A. Aysu* & O. Ulusel*

topics (OpenAlex): Video Coding and Compression Technologies; Advanced Data Compression Techniques; Advanced Vision and Imaging
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2014 article proceedings

Analyzing and eliminating the causes of fault sensitivity analysis

By: N. Ghalaty*, A. Aysu* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
13. Climate Action (OpenAlex)
Source: Crossref
Added: February 24, 2025

2014 journal article

SIMON Says: Break Area Records of Block Ciphers on FPGAs

IEEE Embedded Systems Letters, 6(2), 37–40.

By: A. Aysu*, E. Gulcan* & P. Schaumont*

topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques
Source: Crossref
Added: February 24, 2025

2013 article proceedings

Digital fingerprints for low-cost platforms using MEMS sensors

By: A. Aysu*, N. Ghalaty*, Z. Franklin*, M. Yali* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Memory and Neural Computing; Neuroscience and Neural Engineering
Source: Crossref
Added: February 24, 2025

2013 article proceedings

Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications

By: A. Aysu*, M. Sayinta & C. Cigla*

topics (OpenAlex): Advanced Vision and Imaging; Video Coding and Compression Technologies; Advanced Image Processing Techniques
Source: Crossref
Added: February 24, 2025

2013 article proceedings

Low-cost and area-efficient FPGA implementations of lattice-based cryptography

By: A. Aysu*, C. Patterson* & P. Schaumont*

topics (OpenAlex): Cryptography and Data Security; Cryptographic Implementations and Security; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

2013 article proceedings

PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs

By: A. Aysu* & P. Schaumont*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Neuroscience and Neural Engineering; Integrated Circuits and Semiconductor Failure Analysis
Source: Crossref
Added: February 24, 2025

2013 chapter book

Three Design Dimensions of Secure Embedded Systems

By: P. Schaumont* & A. Aysu*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Cryptographic Implementations and Security; Security and Verification in Computing
Source: Crossref
Added: February 24, 2025

2011 journal article

A low energy adaptive hardware for H.264 multiple reference frame motion estimation

IEEE Transactions on Consumer Electronics, 57(3), 1377–1383.

By: A. Aysu*, G. Sayilar* & I. Hamzaoglu*

topics (OpenAlex): Video Coding and Compression Technologies; Advanced Data Compression Techniques; Advanced Vision and Imaging
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2011 article proceedings

A reconfigurable H.264 video encoder hardware

By: I. Hamzaoglu*, A. Aysu* & O. Ulusel*

topics (OpenAlex): Video Coding and Compression Technologies; Advanced Data Compression Techniques; Advanced Vision and Imaging
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: February 24, 2025

2010 article proceedings

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing

Presented at the SIN '10: 3rd International Conference of Security of Information and Networks.

By: A. Akin*, A. Aysu*, O. Ulusel* & E. Savaş*

topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Coding theory and cryptography
Source: Crossref
Added: February 24, 2025

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2025) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.