-
1
-
-
34547252533
-
CAD-based security, cryptography and digital rights management
-
F. Koushanfar, M. Potkonjak. CAD-based Security, Cryptography, and Digital Rights Management. DAC 2007, pp. 268-269.
-
(2007)
DAC
, pp. 268-269
-
-
Koushanfar, F.1
Potkonjak, M.2
-
2
-
-
76349111305
-
A comprehensive framework for predictive modeling of negative bias temperature instability
-
April
-
S. Chakravarthi, et al. A Comprehensive Framework for Predictive Modeling of Negative Bias Temperature Instability. IEEE International Reliability Physics Symposium April 2004, pp. 273- 282.
-
(2004)
IEEE International Reliability Physics Symposium
, pp. 273-282
-
-
Chakravarthi, S.1
-
3
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Y. Alkabani, et al. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Information Hiding 2008, pp. 102-117.
-
(2008)
Information Hiding
, pp. 102-117
-
-
Alkabani, Y.1
-
4
-
-
1242286077
-
Effective iterative techniques for fingerprinting design IP
-
A. Caldwell, et al. Effective Iterative Techniques for Fingerprinting Design IP. IEEE Transactions on CAD, Vol. 23, No. 2, 2004. pp. 208-215.
-
(2004)
IEEE Transactions on CAD
, vol.23
, Issue.2
, pp. 208-215
-
-
Caldwell, A.1
-
5
-
-
0041633858
-
Parameter variations and impact on circuits and microarchitecture
-
S. Borkar, T. Karnik, S. Narendra, J. Tschanz, A. Keshavarzi, V. De. Parameter Variations and Impact on Circuits and Microarchitecture. DAC 2003, pp. 338-342.
-
(2003)
DAC
, pp. 338-342
-
-
Borkar, S.1
Karnik, T.2
Narendra, S.3
Tschanz, J.4
Keshavarzi, A.5
De, V.6
-
6
-
-
78650884368
-
Scalable segmentation-based malicious circuitry detection and diagnosis
-
S. Wei, M. Potkonjak. Scalable Segmentation-Based Malicious Circuitry Detection and Diagnosis. ICCAD 2010. pp. 483-486.
-
(2010)
ICCAD
, pp. 483-486
-
-
Wei, S.1
Potkonjak, M.2
-
8
-
-
41549090501
-
Analysis and modeling of CD variation for statistical static timing
-
B. Cline, et al. Analysis and Modeling of CD Variation for Statistical Static Timing. ICCAD 2006, pp. 60-66.
-
(2006)
ICCAD
, pp. 60-66
-
-
Cline, B.1
-
9
-
-
0032320827
-
Random dopant induced threshold voltage lowering and fluctuations in sub-0.1 um MOSFET's: A 3-D atomistic simulation study
-
A. Asenov. Random Dopant Induced Threshold Voltage Lowering and Fluctuations in Sub-0.1 um MOSFET's: A 3-D Atomistic Simulation Study. IEEE Transactions on Electron Devices, Vol. 45, No. 12, 1998, pp. 2505-2513.
-
(1998)
IEEE Transactions on Electron Devices
, vol.45
, Issue.12
, pp. 2505-2513
-
-
Asenov, A.1
-
10
-
-
70350733802
-
Hardware trojan horse detection using gate-level characterization
-
M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey. Hardware Trojan horse detection using gate-level characterization. DAC 2009, pp. 688-693.
-
(2009)
DAC
, pp. 688-693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
12
-
-
84855821363
-
-
NI PXI-4130 Power SMU
-
NI PXI-4130 Power SMU: http://sine.ni.com/nips/cds/view/p/lang/en/nid/ 204239.
-
-
-
-
13
-
-
80052739066
-
SVD-based ghost circuitry detection
-
M. Nelson, A. Nahapetian, F. Koushanfar, M. Potkonjak,. SVD-Based Ghost Circuitry Detection. IH 2009, pp. 229-237.
-
(2009)
IH
, pp. 229-237
-
-
Nelson, M.1
Nahapetian, A.2
Koushanfar, F.3
Potkonjak, M.4
-
14
-
-
77956221000
-
Gate-level characterization: Foundations and hardware security applications
-
S. Wei, S. Meguerdichian, M. Potkonjak, Gate-Level Characterization: Foundations and Hardware Security Applications, DAC 2010, pp. 222-227.
-
(2010)
DAC
, pp. 222-227
-
-
Wei, S.1
Meguerdichian, S.2
Potkonjak, M.3
-
15
-
-
80052656400
-
Integrated circuit security techniques using variable supply voltage
-
S. Wei, M. Potkonjak, Integrated Circuit Security Techniques Using Variable Supply Voltage, DAC 2011, pp. 248-253.
-
(2011)
DAC
, pp. 248-253
-
-
Wei, S.1
Potkonjak, M.2
-
18
-
-
80052681348
-
Differential public physically unclonable functions: Architecture and applications
-
M. Potkonjak, S. Meguerdichian, A. Nahapetian, S. Wei. Differential Public Physically Unclonable Functions: Architecture and Applications. DAC 2011.
-
(2011)
DAC
-
-
Potkonjak, M.1
Meguerdichian, S.2
Nahapetian, A.3
Wei, S.4
-
20
-
-
70350068434
-
Hardware aging-based software metering
-
F. Dabiri, M. Potkonjak, Hardware aging-based software metering, DATE 2009, pp. 460-465.
-
(2009)
DATE
, pp. 460-465
-
-
Dabiri, F.1
Potkonjak, M.2
-
21
-
-
80052670809
-
A first step towards automatic application of power analysis countermeasures
-
A. G. Bayrak, F. Regazzoni, P. Brisk, F-X. Standaert, and P. Ienne, A First Step Towards Automatic Application of Power Analysis Countermeasures. DAC 2011.
-
(2011)
DAC
-
-
Bayrak, A.G.1
Regazzoni, F.2
Brisk, P.3
Standaert, F.-X.4
Ienne, P.5
-
23
-
-
38249007777
-
Birthday paradox, coupon collectors, caching algorithms and self-organizing search
-
P. Flajolet, D. Gardy, L. Thimonier. Birthday Paradox, Coupon Collectors, Caching Algorithms and Self-organizing search. Discrete Applied Mathematics, Vol. 39, No. 3, 1992. pp. 207-229.
-
(1992)
Discrete Applied Mathematics
, vol.39
, Issue.3
, pp. 207-229
-
-
Flajolet, P.1
Gardy, D.2
Thimonier, L.3
-
24
-
-
75649141765
-
Ultralow-power design in near-threshold region
-
D. Markovic, et al, Ultralow-Power Design in Near-Threshold Region, Proceedings of the IEEE, Vol. 98, No.2, 2010. pp. 237-252.
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.2
, pp. 237-252
-
-
Markovic, D.1
|