Aydin Aysu Aydin, F., & Aysu, A. (2024, January 12). Leaking secrets in homomorphic encryption with side-channel attacks. JOURNAL OF CRYPTOGRAPHIC ENGINEERING. https://doi.org/10.1007/s13389-023-00340-2 Dubey, A., Cammarota, R., Varna, A., Kumar, R., & Aysu, A. (2023). Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. 2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 155–166. https://doi.org/10.1109/HOST55118.2023.10133716 Karabulut, E., Awad, A., & Aysu, A. (2023). SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs. 2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS. https://doi.org/10.1109/ISCAS46773.2023.10181609 Potluri, S., Kundu, S., Kumar, A., Basu, K., & Aysu, A. (2023). SeqL plus : Secure Scan-Obfuscation With Theoretical and Empirical Validation. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 42(5), 1406–1410. https://doi.org/10.1109/TCAD.2022.3199153 Mert, A. C., Karabulut, E., Ozturk, E., Savas, E., & Aysu, A. (2022). An Extensive Study of Flexible Design Methods for the Number Theoretic Transform. IEEE TRANSACTIONS ON COMPUTERS, 71(11), 2829–2843. https://doi.org/10.1109/TC.2020.3017930 Haas, G., & Aysu, A. (2022). Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto. PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252. https://doi.org/10.1145/3489517.3530437 Gajjar, A., Kashyap, P., Aysu, A., Franzon, P., Dey, S., & Cheng, C. (2022). FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS. 2022 IEEE 30TH INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2022), pp. 113–121. https://doi.org/10.1109/FCCM53951.2022.9786085 Dubey, A., Cammarota, R., Suresh, V., & Aysu, A. (2022). Guarding Machine Learning Hardware Against Physical Side-channel Attacks. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 18(3). https://doi.org/10.1145/3465377 Dubey, A., Karabulut, E., Awad, A., & Aysu, A. (2022). High-Fidelity Model Extraction Attacks via Remote Power Monitors. 2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331. https://doi.org/10.1109/AICAS54282.2022.9869973 Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J., & Tehranipoor, S. (2022). Towards AI-Enabled Hardware Security: Challenges and Opportunities. 2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022). https://doi.org/10.1109/IOLTS56730.2022.9897507 Kashyap, P., Aydin, F., Potluri, S., Franzon, P. D., & Aysu, A. (2021). 2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 40(6), 1217–1229. https://doi.org/10.1109/TCAD.2020.3038701 Chen, Z., Karabulut, E., Aysu, A., Ma, Y., & Jing, J. (2021). An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature. 2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), pp. 583–590. https://doi.org/10.1109/ICCD53106.2021.00094 Karabulut, E., Alkim, E., & Aysu, A. (2021). Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography. IEEE TRANSACTIONS ON COMPUTERS, 71(8), 1810–1823. https://doi.org/10.1109/TC.2021.3107729 Karabulut, E., & Aysu, A. (2021). FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks. 2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), pp. 691–696. https://doi.org/10.1109/DAC18074.2021.9586131 Karabulut, E., Alkim, E., & Aysu, A. (2021). Single-Trace Side-Channel Attacks on omega-Small Polynomial Sampling. 2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 35–45. https://doi.org/10.1109/HOST49136.2021.9702284 Potluri, S., & Aysu, A. (2021). Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware. 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD). https://doi.org/10.1109/ICCAD51958.2021.9643547 Haas, G., Potluri, S., & Aysu, A. (2021). iTimed: Cache Attacks on the Apple A10 Fusion SoC. 2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 80–90. https://doi.org/10.1109/HOST49136.2021.9702290 Dubey, A., Cammarota, R., & Aysu, A. (2020). BoMaNet: Boolean Masking of an Entire Neural Network. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD). https://doi.org/10.1145/3400302.3415649 Ozcan, E., & Aysu, A. (2020). High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems. IEEE EMBEDDED SYSTEMS LETTERS, 12(4), 133–136. https://doi.org/10.1109/LES.2019.2960457 Regazzoni, F., Bhasin, S., Pour, A. A., Alshaer, I., Aydin, F., Aysu, A., … Yli-Mayry, V. (2020). Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD). https://doi.org/10.1145/3400302.3416260 Karabulut, E., & Aysu, A. (2020). RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform. 2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), pp. 26–32. https://doi.org/10.1109/FPL50879.2020.00016 Aysu, A. (2019). Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers. GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, pp. 237–242. https://doi.org/10.1145/3299874.3317994