Follow
Amitabh Das
Amitabh Das
AMD. Austin, Texas, USA & Intel Corporation, Hillsboro, Oregon, USA & COSIC/ESAT, KU Leuven, Belgium
Verified email at amd.com - Homepage
Title
Cited by
Cited by
Year
Test versus Security: Past and Present
J Da Rolt, A Das, G Di Natale, ML Flottes, B Rouzeyre, I Verbauwhede
IEEE Transactions on Emerging Topics in Computing 2 (1), 50-62, 2014
1122014
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures
L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ...
Radio Frequency Identification: Security and Privacy Issues 9th …, 2013
772013
Secure JTAG implementation using Schnorr protocol
A Das, J Da Rolt, S Ghosh, S Seys, S Dupuis, G Di Natale, ML Flottes, ...
Journal of Electronic Testing 29, 193-209, 2013
522013
PUF-based secure test wrapper design for cryptographic SoC testing
A Das, Ü Kocabaş, AR Sadeghi, I Verbauwhede
Proceedings of the IEEE/ACM Conference on Design, Automation and Test in …, 2012
502012
Security analysis of industrial test compression schemes
A Das, B Ege, S Ghosh, L Batina, I Verbauwhede
IEEE transactions on computer-aided design of integrated circuits and …, 2013
462013
Powert channels: A novel class of covert communicationexploiting power management vulnerabilities
SK Khatamifard, L Wang, A Das, S Kose, UR Karpuzcu
2019 IEEE International Symposium on High Performance Computer Architecture …, 2019
442019
Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications
S Koteshwara, A Das
IEEE Design & Test 34 (4), 26-33, 2017
432017
A new scan attack on rsa in presence of industrial countermeasures
J Da Rolt, A Das, G Di Natale, ML Flottes, B Rouzeyre, I Verbauwhede
Constructive Side-Channel Analysis and Secure Design: Third International …, 2012
402012
FPGA Implementation and Comparison of AES-GCM and Deoxys Authenticated Encryption Schemes
S Koteshwara, A Das, K Parhi
IEEE International Symposium on Circuits & Systems (ISCAS) 2017, 1-4, 2017
302017
A scan-based attack on elliptic curve cryptosystems in presence of industrial design-for-testability structures
J Da Rolt, A Das, G Di Natale, ML Flottes, B Rouzeyre, I Verbauwhede
2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2012
292012
Differential scan attack on AES with X-tolerant and X-masked test response compactor
B Ege, A Das, S Gosh, I Verbauwhede
Digital System Design (DSD), 2012 15th IEEE Euromicro Conference on, 545-552, 2012
292012
Teaching HW/SW Co-Design With a Public Key Cryptography Application
L Uhsadel, M Ullrich, A Das, D Karaklajic, J Balasch, I Verbauwhede, ...
IEEE Transactions on Education 56 (4), 478-483, 2013
252013
On the implementation of unified arithmetic on binary huff curves
S Ghosh, A Kumar, A Das, I Verbauwhede
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
202013
Fast prototyping of a digital PID controller on a FPGA based soft-core microcontroller for precision control of a brushed DC servo motor
A Das, K Banerjee
2009 35th Annual Conference of IEEE Industrial Electronics, 2825-2830, 2009
182009
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms
S Koteshwara, A Das, KK Parhi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (5 …, 2019
152019
Performance Comparison of AES-GCM-SIV and AES-GCM Algorithms for Authenticated Encryption on FPGA platforms
S Koteshwara, A Das, K Parhi
51st Asilomar Conference on Signals, Systems, and Computers, ACSSC 2017 …, 2017
132017
Challenge-response based secure test wrapper for testing cryptographic circuits
A Das, M Knezevic, S Seys, I Verbauwhede
IEEE European Test Symposium (ETS), 672-677, 2011
122011
Security of countermeasures against state-of-the-art differential scan attacks
B Ege, A Das, L Batina, I Verbauwhede
[Sl]: COST, 2013
52013
Probabilistic hardware trojan attacks on multiple layers of reconfigurable network infrastructure
R Mukherjee, V Govindan, S Koteshwara, A Das, KK Parhi, ...
Journal of Hardware and Systems Security 4, 343-360, 2020
42020
ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch
V Govindan, S Koteshwara, A Das, KK Parhi, RS Chakraborty
International Conference on Security, Privacy, and Applied Cryptography …, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20