Follow
C Gebotys
C Gebotys
University of Waterloo
No verified email
Title
Cited by
Cited by
Year
Faster explicit formulas for computing pairings over ordinary curves
DF Aranha, K Karabina, P Longa, CH Gebotys, J López
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
2802011
Global optimization approach for architectural synthesis
CH Gebotys, MI Elmasry
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1993
1981993
EM analysis of Rijndael and ECC on a wireless Java-based PDA
CH Gebotys, S Ho, CC Tiu
International Workshop on Cryptographic Hardware and Embedded Systems, 250-264, 2005
1802005
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres
Transactions on Computational Science IV: Special Issue on Security in …, 2009
1252009
PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs
M Khalafalla, C Gebotys
2019 Design, automation & test in Europe conference & exhibition (DATE), 204-209, 2019
1162019
Low energy memory and register allocation using network flow
CH Gebotys
Proceedings of the 34th Annual Design Automation Conference, 435-440, 1997
1131997
Optimal VLSI architectural synthesis: area, performance and testability
CH Gebotys, MI Elmasry
Springer Science & Business Media, 2012
1082012
Simultaneous scheduling and allocation for cost constrained optimal architectural synthesis
CH Gebotys, MI Elmasry
Proceedings of the 28th ACM/IEEE Design Automation Conference, 2-7, 1991
1041991
A framework for security on NoC technologies
CH Gebotys, RJ Gebotys
IEEE Computer Society Annual Symposium on VLSI, 2003. Proceedings., 113-117, 2003
1002003
Optimal synthesis of high-performance architectures
CH Gebotys, MI Elmasry
IEEE Journal of Solid-State Circuits 27 (3), 389-397, 1992
901992
Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor
CH Gebotys, RJ Gebotys
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
742003
DSP address optimization using a minimum cost circulation technique
Gebotys
1997 Proceedings of IEEE International Conference on Computer Aided Design …, 1997
681997
A table masking countermeasure for low-energy secure embedded systems
CH Gebotys
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14 (7), 740-753, 2006
662006
Efficient techniques for high-speed elliptic curve cryptography
P Longa, C Gebotys
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
642010
Security in embedded devices
CH Gebotys
Springer Science & Business Media, 2009
622009
VLSI design synthesis with testability
CH Gebotys, MI Elmasry
Annual ACM IEEE Design Automation Conference: Proceedings of the 25 th ACM …, 1988
581988
Optimal scheduling and allocation of embedded VLSI chips
CH Gebotys
Annual ACM IEEE Design Automation Conference: Proceedings of the 29 th ACM …, 1992
561992
An empirical comparison of algorithmic, instruction, and architectural power prediction models for high performance embedded DSP processors
CH Gebotys, RJ Gebotys
Proceedings of the 1998 international symposium on Low power electronics and …, 1998
551998
Current flattening in software and hardware for security applications
R Muresan, C Gebotys
Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware …, 2004
532004
EM fault injection on ARM and RISC-V
MA Elmohr, H Liao, CH Gebotys
2020 21st International Symposium on Quality Electronic Design (ISQED), 206-212, 2020
492020
The system can't perform the operation now. Try again later.
Articles 1–20