Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2024 article
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature
2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 90–100.
2024 article
Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware
PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, pp. 495–495.
2024 article
Leaking secrets in homomorphic encryption with side-channel attacks
Aydin, F., & Aysu, A. (2024, January 12). JOURNAL OF CRYPTOGRAPHIC ENGINEERING.
2023 article
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference
2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 155–166.
2023 article
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.
2022 article
Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252.
2022 article
FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS
2022 IEEE 30TH INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2022), pp. 113–121.
2022 journal article
Guarding Machine Learning Hardware Against Physical Side-channel Attacks
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 18(3).
2022 article
High-Fidelity Model Extraction Attacks via Remote Power Monitors
2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.
2022 journal article
SeqL plus : Secure Scan-Obfuscation With Theoretical and Empirical Validation
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 42(5), 1406–1410.
2022 article
Towards AI-Enabled Hardware Security: Challenges and Opportunities
2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022).
2021 article
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), pp. 583–590.
2021 journal article
Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography
IEEE TRANSACTIONS ON COMPUTERS, 71(8), 1810–1823.
2021 article
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), pp. 691–696.
2021 article
Single-Trace Side-Channel Attacks on omega-Small Polynomial Sampling
2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 35–45.
2021 article
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD).
2021 article
iTimed: Cache Attacks on the Apple A10 Fusion SoC
2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 80–90.
2020 journal article
2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 40(6), 1217–1229.
2020 journal article
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform
IEEE TRANSACTIONS ON COMPUTERS, 71(11), 2829–2843.
2020 article
BoMaNet: Boolean Masking of an Entire Neural Network
2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).
2020 article
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk
2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).
2020 article
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform
2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), pp. 26–32.
2019 journal article
High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems
IEEE EMBEDDED SYSTEMS LETTERS, 12(4), 133–136.
2019 article
Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers
GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, pp. 237–242.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.