Shivam Bhasin
Shivam Bhasin
Potvrđena adresa e-pošte na ntu.edu.sg
NaslovCitiranoGodina
Hardware Trojan Horses in Cryptographic IP Cores
S Bhasin, JL Danger, S Guilley, XT Ngo, L Sauvage
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, 15-29, 2013
922013
BCDL: a high speed balanced DPL for FPGA with global precharge and no early evaluation
M Nassar, S Bhasin, JL Danger, G Duc, S Guilley
Proceedings of the Conference on Design, Automation and Test in Europe, 849-854, 2010
772010
WDDL is protected against setup time violation attacks
N Selmane, S Bhasin, S Guilley, T Graba, JL Danger
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009 Workshop on, 73-83, 2009
552009
A survey on hardware trojan detection techniques
S Bhasin, F Regazzoni
Circuits and Systems (ISCAS), 2015 IEEE International Symposium on, 2021-2024, 2015
512015
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage.
S Bhasin, JL Danger, S Guilley, Z Najm
IACR Cryptology ePrint Archive 2013, 717, 2013
462013
Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors
JL Danger, S Guilley, S Bhasin, M Nassar
Signals, Circuits and Systems (SCS), 2009 3rd International Conference on, 1-8, 2009
412009
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses
XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm
Hardware Oriented Security and Trust (HOST), 2015 IEEE International …, 2015
382015
Countering early evaluation: an approach towards robust dual-rail precharge logic
S Bhasin, S Guilley, F Flament, N Selmane, JL Danger
Proceedings of the 5th Workshop on Embedded Systems Security, 6, 2010
352010
Side-channel leakage and trace compression using normalized inter-class variance
S Bhasin, JL Danger, S Guilley, Z Najm
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
292014
Analysis and improvements of the DPA contest v4 implementation
S Bhasin, N Bruneau, JL Danger, S Guilley, Z Najm
International Conference on Security, Privacy, and Applied Cryptography …, 2014
282014
Theory of masking with codewords in hardware: low-weight d th-order correlation-immune Boolean functions.
S Bhasin, C Carlet, S Guilley
IACR Cryptology ePrint Archive 2013, 303, 2013
282013
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
272018
Hardware trojan detection by delay and electromagnetic measurements
XT Ngo, I Exurville, S Bhasin, JL Danger, S Guilley, Z Najm, JB Rigaud, ...
Proceedings of the 2015 Design, Automation & Test in Europe Conference …, 2015
272015
A look into SIMON from a side-channel perspective
S Bhasin, T Graba, JL Danger, Z Najm
Hardware-Oriented Security and Trust (HOST), 2014 IEEE International …, 2014
272014
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
S Bhasin, S Guilley, L Sauvage, JL Danger
Cryptographers’ Track at the RSA Conference, 195-207, 2010
262010
Combined SCA and DFA countermeasures integrable in a FPGA design flow
S Bhasin, JL Danger, F Flament, T Graba, S Guilley, Y Mathieu, M Nassar, ...
Reconfigurable Computing and FPGAs, 2009. ReConFig'09. International …, 2009
262009
Time-frequency analysis for second-order attacks
P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ...
International Conference on Smart Card Research and Advanced Applications …, 2013
242013
Security evaluation of different AES implementations against practical setup time violation attacks in FPGAs
S Bhasin, N Selmane, S Guilley, JL Danger
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009
212009
Fault attacks, injection techniques and tools for simulation
R Piscitelli, S Bhasin, F Regazzoni
Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015 10th …, 2015
202015
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
192019
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20