In cryptographic algorithms, the constants to be multiplied by a variabl...
Integrated Circuits (ICs) are the target of diverse attacks during their...
Building and maintaining a silicon foundry is a costly endeavor that req...
A digital Finite Impulse Response (FIR) filter is a ubiquitous block in
...
While various obfuscation methods exist in the digital domain, technique...
A potential vulnerability for integrated circuits (ICs) is the insertion...
Numerous threats are associated with the globalized integrated circuit (...
This brief addresses the problem of implementing very large constant
mul...
Numerous security threats are emerging from untrusted players in the
int...
Neural networks (NNs) are already deployed in hardware today, becoming
v...
A finite impulse response (FIR) filter is a ubiquitous block in digital
...
Globalization in the semiconductor industry enables fabless design house...
Owning a high-end semiconductor foundry is a luxury very few companies c...
Modern Systems on Chip (SoC), almost as a rule, require accelerators for...
Threats associated with the untrusted fabrication of integrated circuits...
This paper presents a design space exploration for SABER, one of the
fin...
The recent advances in the area of design obfuscation are encouraging, b...
The roll-out of technologies like 5G and the need for multi-terabit band...
This paper presents a high-level circuit obfuscation technique to preven...
The interplay between security and reliability is poorly understood. Thi...
Design companies often outsource their integrated circuit (IC) fabricati...
Polynomial multiplication is a bottleneck in most of the public-key
cryp...
Security of currently deployed public key cryptography algorithms is for...
In today's integrated circuit (IC) ecosystem, owning a trusted foundry i...
Globalization of IC manufacturing has led to increased security concerns...
Security is an important facet of integrated circuit design for many
app...