The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M van Dijk IACR Cryptology ePrint Archive 2018 (350), 2018 | 188 | 2018 |
Security analysis of concurrent error detection against differential fault analysis X Guo, D Mukhopadhyay, C Jin, R Karri Journal of Cryptographic Engineering 5, 153-169, 2015 | 91 | 2015 |
Advancing the state-of-the-art in hardware trojans detection SK Haider, C Jin, M Ahmad, DM Shila, O Khan, M van Dijk IEEE Transactions on Dependable and Secure Computing 16 (1), 18-32, 2017 | 88* | 2017 |
A survey of cybersecurity of digital manufacturing P Mahesh, A Tiwari, C Jin, PR Kumar, ALN Reddy, STS Bukkapatanam, ... Proceedings of the IEEE 109 (4), 495-516, 2020 | 61 | 2020 |
Security of cloud FPGAs: A survey C Jin, V Gohil, R Karri, J Rajendran arXiv preprint arXiv:2005.04867, 2020 | 49* | 2020 |
Phase calibrated ring oscillator PUF design and implementation on FPGAs W Yan, C Jin, F Tehranipoor, JA Chandy 2017 27th International Conference on Field Programmable Logic and …, 2017 | 37 | 2017 |
Fpga implementation of a cryptographically-secure puf based on learning parity with noise C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk Cryptography 1 (3), 23, 2017 | 36 | 2017 |
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems C Jin, S Valizadeh, M van Dijk 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 824-829, 2018 | 29* | 2018 |
Advancing the state-of-the-art in hardware trojans design SK Haider, C Jin, M van Dijk 2017 IEEE 60th International Midwest Symposium on Circuits and Systems …, 2017 | 27 | 2017 |
Phase change memory and its applications in hardware security RS Khan, N Noor, C Jin, J Scoggin, Z Woods, S Muneer, A Ciardullo, ... Security Opportunities in Nano Devices and Emerging Technologies, 93-114, 2017 | 25* | 2017 |
Secure and efficient initialization and authentication protocols for SHIELD C Jin, M van Dijk IEEE Transactions on Dependable and Secure Computing 16 (1), 156-173, 2017 | 21 | 2017 |
Efficient erasable PUFs from programmable logic and memristors Y Gao, C Jin, J Kim, H Nili, X Xu, W Burleson, O Kavehei, M van Dijk, ... Cryptology ePrint Archive, 2018 | 19 | 2018 |
PLCrypto: A symmetric cryptographic library for programmable logic controllers Z Yang, Z Bao, C Jin, Z Liu, J Zhou IACR Transactions on Symmetric Cryptology, 170-217, 2021 | 14 | 2021 |
Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems Z Yang, C Jin, Y Tian, J Lai, J Zhou Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 14 | 2020 |
NREPO: Normal basis recomputing with permuted operands X Guo, D Mukhopadhyay, C Jin, R Karri 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 12 | 2014 |
Programmable access-controlled and generic erasable PUF design and its applications C Jin, W Burleson, M van Dijk, U Rührmair Journal of Cryptographic Engineering 12 (4), 413-432, 2022 | 11 | 2022 |
Erasable pufs: Formal treatment and generic design C Jin, W Burleson, M van Dijk, U Rührmair Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020 | 11* | 2020 |
HMACCE: establishing authenticated and confidential channel from historical data for industrial internet of things C Jin, Z Yang, T Xiang, S Adepu, J Zhou IEEE Transactions on Information Forensics and Security 18, 1080-1094, 2023 | 10* | 2023 |
Proof of aliveness C Jin, Z Yang, M van Dijk, J Zhou Proceedings of the 35th Annual Computer Security Applications Conference, 1-16, 2019 | 10 | 2019 |
New clone-detection approach for RFID-based supply chains H Maleki, R Rahaeimehr, C Jin, M Van Dijk 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 10 | 2017 |