Test versus Security: Past and Present J Da Rolt, A Das, G Di Natale, ML Flottes, B Rouzeyre, I Verbauwhede IEEE Transactions on Emerging Topics in Computing 2 (1), 50-62, 2014 | 112 | 2014 |
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ... Radio Frequency Identification: Security and Privacy Issues 9th …, 2013 | 79 | 2013 |
Secure JTAG implementation using Schnorr protocol A Das, J Da Rolt, S Ghosh, S Seys, S Dupuis, G Di Natale, ML Flottes, ... Journal of Electronic Testing 29, 193-209, 2013 | 54 | 2013 |
PUF-based secure test wrapper design for cryptographic SoC testing A Das, Ü Kocabaş, AR Sadeghi, I Verbauwhede Proceedings of the IEEE/ACM Conference on Design, Automation and Test in …, 2012 | 49 | 2012 |
Powert channels: A novel class of covert communicationexploiting power management vulnerabilities SK Khatamifard, L Wang, A Das, S Kose, UR Karpuzcu 2019 IEEE International Symposium on High Performance Computer Architecture …, 2019 | 46 | 2019 |
Security analysis of industrial test compression schemes A Das, B Ege, S Ghosh, L Batina, I Verbauwhede IEEE transactions on computer-aided design of integrated circuits and …, 2013 | 46 | 2013 |
Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications S Koteshwara, A Das IEEE Design & Test 34 (4), 26-33, 2017 | 42 | 2017 |
A new scan attack on rsa in presence of industrial countermeasures J Da Rolt, A Das, G Di Natale, ML Flottes, B Rouzeyre, I Verbauwhede Constructive Side-Channel Analysis and Secure Design: Third International …, 2012 | 40 | 2012 |
FPGA Implementation and Comparison of AES-GCM and Deoxys Authenticated Encryption Schemes S Koteshwara, A Das, K Parhi IEEE International Symposium on Circuits & Systems (ISCAS) 2017, 1-4, 2017 | 31 | 2017 |
Differential scan attack on AES with X-tolerant and X-masked test response compactor B Ege, A Das, S Gosh, I Verbauwhede Digital System Design (DSD), 2012 15th IEEE Euromicro Conference on, 545-552, 2012 | 30 | 2012 |
A scan-based attack on elliptic curve cryptosystems in presence of industrial design-for-testability structures J Da Rolt, A Das, G Di Natale, ML Flottes, B Rouzeyre, I Verbauwhede 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2012 | 29 | 2012 |
Teaching HW/SW Co-Design With a Public Key Cryptography Application L Uhsadel, M Ullrich, A Das, D Karaklajic, J Balasch, I Verbauwhede, ... IEEE Transactions on Education 56 (4), 478-483, 2013 | 25 | 2013 |
On the implementation of unified arithmetic on binary huff curves S Ghosh, A Kumar, A Das, I Verbauwhede Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 20 | 2013 |
Fast prototyping of a digital PID controller on a FPGA based soft-core microcontroller for precision control of a brushed DC servo motor A Das, K Banerjee 2009 35th Annual Conference of IEEE Industrial Electronics, 2825-2830, 2009 | 18 | 2009 |
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms S Koteshwara, A Das, KK Parhi IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (5 …, 2019 | 15 | 2019 |
Performance Comparison of AES-GCM-SIV and AES-GCM Algorithms for Authenticated Encryption on FPGA platforms S Koteshwara, A Das, K Parhi 51st Asilomar Conference on Signals, Systems, and Computers, ACSSC 2017 …, 2017 | 13 | 2017 |
Challenge-response based secure test wrapper for testing cryptographic circuits A Das, M Knezevic, S Seys, I Verbauwhede IEEE European Test Symposium (ETS), 672-677, 2011 | 11 | 2011 |
A BIST-based Dynamic Obfuscation Scheme for Resilience against Removal and Oracle-guided Attacks J Talukdar, S Chen, A Das, S Aftabjahani, P Song, K Chakrabarty IEEE International Test Conference (ITC) 2021, Anaheim, CA, USA, 170-179, 2021 | 5 | 2021 |
Security of countermeasures against state-of-the-art differential scan attacks B Ege, A Das, L Batina, I Verbauwhede [Sl]: COST, 2013 | 5 | 2013 |
Probabilistic hardware trojan attacks on multiple layers of reconfigurable network infrastructure R Mukherjee, V Govindan, S Koteshwara, A Das, KK Parhi, ... Journal of Hardware and Systems Security 4, 343-360, 2020 | 4 | 2020 |