Faster explicit formulas for computing pairings over ordinary curves DF Aranha, K Karabina, P Longa, CH Gebotys, J López Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 280 | 2011 |
Global optimization approach for architectural synthesis CH Gebotys, MI Elmasry IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1993 | 198 | 1993 |
EM analysis of Rijndael and ECC on a wireless Java-based PDA CH Gebotys, S Ho, CC Tiu International Workshop on Cryptographic Hardware and Embedded Systems, 250-264, 2005 | 180 | 2005 |
Hardware mechanisms for memory authentication: A survey of existing techniques and engines R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres Transactions on Computational Science IV: Special Issue on Security in …, 2009 | 125 | 2009 |
PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs M Khalafalla, C Gebotys 2019 Design, automation & test in Europe conference & exhibition (DATE), 204-209, 2019 | 116 | 2019 |
Low energy memory and register allocation using network flow CH Gebotys Proceedings of the 34th Annual Design Automation Conference, 435-440, 1997 | 113 | 1997 |
Optimal VLSI architectural synthesis: area, performance and testability CH Gebotys, MI Elmasry Springer Science & Business Media, 2012 | 108 | 2012 |
Simultaneous scheduling and allocation for cost constrained optimal architectural synthesis CH Gebotys, MI Elmasry Proceedings of the 28th ACM/IEEE Design Automation Conference, 2-7, 1991 | 104 | 1991 |
A framework for security on NoC technologies CH Gebotys, RJ Gebotys IEEE Computer Society Annual Symposium on VLSI, 2003. Proceedings., 113-117, 2003 | 100 | 2003 |
Optimal synthesis of high-performance architectures CH Gebotys, MI Elmasry IEEE Journal of Solid-State Circuits 27 (3), 389-397, 1992 | 90 | 1992 |
Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor CH Gebotys, RJ Gebotys Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003 | 74 | 2003 |
DSP address optimization using a minimum cost circulation technique Gebotys 1997 Proceedings of IEEE International Conference on Computer Aided Design …, 1997 | 68 | 1997 |
A table masking countermeasure for low-energy secure embedded systems CH Gebotys IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14 (7), 740-753, 2006 | 66 | 2006 |
Efficient techniques for high-speed elliptic curve cryptography P Longa, C Gebotys Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010 | 64 | 2010 |
Security in embedded devices CH Gebotys Springer Science & Business Media, 2009 | 62 | 2009 |
VLSI design synthesis with testability CH Gebotys, MI Elmasry Annual ACM IEEE Design Automation Conference: Proceedings of the 25 th ACM …, 1988 | 58 | 1988 |
Optimal scheduling and allocation of embedded VLSI chips CH Gebotys Annual ACM IEEE Design Automation Conference: Proceedings of the 29 th ACM …, 1992 | 56 | 1992 |
An empirical comparison of algorithmic, instruction, and architectural power prediction models for high performance embedded DSP processors CH Gebotys, RJ Gebotys Proceedings of the 1998 international symposium on Low power electronics and …, 1998 | 55 | 1998 |
Current flattening in software and hardware for security applications R Muresan, C Gebotys Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware …, 2004 | 53 | 2004 |
EM fault injection on ARM and RISC-V MA Elmohr, H Liao, CH Gebotys 2020 21st International Symposium on Quality Electronic Design (ISQED), 206-212, 2020 | 49 | 2020 |