关注
Aydin Aysu
标题
引用次数
引用次数
年份
End-to-end design of a PUF-based privacy preserving authentication protocol
A Aysu, E Gulcan, D Moriyama, P Schaumont, M Yung
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1392015
Low-cost and area-efficient FPGA implementations of lattice-based cryptography
A Aysu, C Patterson, P Schaumont
2013 IEEE international symposium on hardware-oriented security and trust …, 2013
1182013
SIMON says: Break area records of block ciphers on FPGAs
A Aysu, E Gulcan, P Schaumont
IEEE Embedded Systems Letters 6 (2), 37-40, 2014
1132014
Maskednet: The first hardware inference engine aiming power side-channel protection
A Dubey, R Cammarota, A Aysu
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
105*2020
An extensive study of flexible design methods for the number theoretic transform
AC Mert, E Karabulut, E Öztürk, E Savaş, A Aysu
IEEE Transactions on Computers 71 (11), 2829-2843, 2020
702020
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols
A Aysu, Y Tobah, M Tiwari, A Gerstlauer, M Orshansky
2018 IEEE international symposium on hardware oriented security and trust …, 2018
702018
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single-and multi-message hashing
A Akin, A Aysu, OC Ulusel, E Savaş
Proceedings of the 3rd International Conference on Security of Information …, 2010
582010
BoMaNet: Boolean masking of an entire neural network
A Dubey, R Cammarota, A Aysu
Proceedings of the 39th International Conference on Computer-Aided Design, 1-9, 2020
522020
Digital fingerprints for low-cost platforms using MEMS sensors
A Aysu, NF Ghalaty, Z Franklin, MP Yali, P Schaumont
Proceedings of the Workshop on Embedded Systems Security, 1-6, 2013
522013
A flexible and scalable NTT hardware: Applications from homomorphically encrypted deep learning to post-quantum cryptography
AC Mert, E Karabulut, E Öztürk, E Savaş, M Becchi, A Aysu
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 346-351, 2020
502020
Binary Ring-LWE hardware with power side-channel countermeasures
A Aysu, M Orshansky, M Tiwari
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
482018
A flexible and compact hardware architecture for the SIMON block cipher
E Gulcan, A Aysu, P Schaumont
Lightweight Cryptography for Security and Privacy: Third International …, 2015
422015
RANTT: A RISC-V architecture extension for the number theoretic transform
E Karabulut, A Aysu
2020 30th International Conference on Field-Programmable Logic and …, 2020
392020
Falcon down: Breaking falcon post-quantum signature scheme through side-channel attacks
E Karabulut, A Aysu
2021 58th ACM/IEEE Design Automation Conference (DAC), 691-696, 2021
372021
Using power-anomalies to counter evasive micro-architectural attacks in embedded systems
S Wei, A Aysu, M Orshansky, A Gerstlauer, M Tiwari
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
332019
Single-trace side-channel attacks on ω-small polynomial sampling: with applications to NTRU, NTRU prime, and crystals-dilithium
E Karabulut, E Alkim, A Aysu
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
292021
Machine learning and hardware security: Challenges and opportunities
F Regazzoni, S Bhasin, AA Pour, I Alshaer, F Aydin, A Aysu, V Beroulle, ...
Proceedings of the 39th International Conference on Computer-Aided Design, 1-6, 2020
262020
Analyzing and eliminating the causes of fault sensitivity analysis
NF Ghalaty, A Aysu, P Schaumont
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
262014
Guarding machine learning hardware against physical side-channel attacks
A Dubey, R Cammarota, V Suresh, A Aysu
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-31, 2022
252022
Modulonet: Neural networks meet modular arithmetic for efficient hardware masking
A Dubey, A Ahmad, MA Pasha, R Cammarota, A Aysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 506-556, 2022
252022
系统目前无法执行此操作,请稍后再试。
文章 1–20