Patrick R. Schaumont, Ph.D. - Publications

Affiliations: 
2004 University of California, Los Angeles, Los Angeles, CA 
Area:
Electronics and Electrical Engineering, Computer Science

44 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Kiaei P, Schaumont P. Synthesis of Parallel Synchronous Software Ieee Embedded Systems Letters. 1-1. DOI: 10.1109/Les.2020.2992051  0.402
2019 Yuce B, Deshpande C, Ghodrati M, Bendre A, Nazhandali L, Schaumont P. A Secure Exception Mode for Fault-Attack-Resistant Processing Ieee Transactions On Dependable and Secure Computing. 16: 388-401. DOI: 10.1109/Tdsc.2018.2823767  0.437
2018 Schaumont P, Lee R, Perez R, Bertoni G. Special Section on Secure Computer Architectures Ieee Transactions On Computers. 67: 305-306. DOI: 10.1109/Tc.2017.2788658  0.421
2018 Mulder ED, Eisenbarth T, Schaumont P. Identifying and Eliminating Side-Channel Leaks in Programmable Systems Ieee Design & Test of Computers. 35: 74-89. DOI: 10.1109/Mdat.2017.2766166  0.369
2018 Schaumont P, Montuschi P. The Rise of Hardware Security in Computer Architectures Ieee Computer. 51: 4-5. DOI: 10.1109/Mc.2018.3191252  0.467
2018 Yuce B, Schaumont P, Witteman M. Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation Arxiv: Cryptography and Security. 2: 111-130. DOI: 10.1007/S41635-018-0038-1  0.355
2018 Krishnan AS, Schaumont P. Exploiting Security Vulnerabilities in Intermittent Computing. Space. 104-124. DOI: 10.1007/978-3-030-05072-6_7  0.417
2017 Rawat H, Schaumont P. Vector Instruction Set Extensions for Efficient Computation of Keccak Ieee Transactions On Computers. 66: 1778-1789. DOI: 10.1109/Tc.2017.2700795  0.415
2016 Aysu A, Schaumont P. Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms Ieee Transactions On Computers. 65: 2925-2931. DOI: 10.1109/Tc.2015.2500570  0.364
2016 Aysu A, Gulcan E, Moriyama D, Schaumont P. Compact and low-power ASIP design for lightweight PUF-based authentication protocols Iet Information Security. 10: 232-241. DOI: 10.1049/Iet-Ifs.2015.0401  0.506
2016 Schaumont P, Yuce B, Pabbuleti KC, Mane DH. Secure authentication with energy-harvesting: A multi-dimensional balancing act Sustainable Computing: Informatics and Systems. 12: 83-95. DOI: 10.1016/J.Suscom.2015.10.002  0.38
2015 Taha M, Schaumont P. Key Updating for Leakage Resiliency With Application to AES Modes of Operation Ieee Transactions On Information Forensics and Security. 10: 519-528. DOI: 10.1109/Tifs.2014.2383359  0.484
2015 Eldib H, Wang C, Taha M, Schaumont P. Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 1558-1568. DOI: 10.1109/Tcad.2015.2424951  0.485
2015 Aysu A, Schaumont P. Hardware/software co-design of physical unclonable function based authentications on FPGAs Microprocessors and Microsystems. 39: 589-597. DOI: 10.1016/J.Micpro.2015.04.001  0.496
2014 Eldib H, Wang C, Schaumont P. Formal Verification of Software Countermeasures against Side-Channel Attacks Acm Transactions On Software Engineering and Methodology. 24: 11. DOI: 10.1145/2685616  0.536
2014 Maiti A, Schaumont P. The impact of aging on a physical unclonable function Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 22: 1854-1864. DOI: 10.1109/Tvlsi.2013.2279875  0.307
2014 Aysu A, Gulcan E, Schaumont P. SIMON Says: Break Area Records of Block Ciphers on FPGAs Ieee Embedded Systems Letters. 6: 37-40. DOI: 10.1109/Les.2014.2314961  0.414
2013 Chen Z, Sinha A, Schaumont P. Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks Ieee Transactions On Computers. 62: 124-136. DOI: 10.1109/Tc.2011.225  0.592
2013 Srivastav M, Guo X, Huang S, Ganta D, Henry MB, Nazhandali L, Schaumont P. Design and benchmarking of an ASIC with five SHA-3 finalist candidates Microprocessors and Microsystems. 37: 246-257. DOI: 10.1016/J.Micpro.2012.09.001  0.452
2013 Prouff E, Schaumont P. Introduction to the CHES 2012 special issue Journal of Cryptographic Engineering. 3: 1-1. DOI: 10.1007/S13389-013-0055-5  0.453
2013 Schaumont P, Aysu A. Three Design Dimensions of Secure Embedded Systems Space. 1-20. DOI: 10.1007/978-3-642-41224-0_1  0.413
2012 Maiti A, Kim I, Schaumont P. A robust physical unclonable function with enhanced challenge-response set Ieee Transactions On Information Forensics and Security. 7: 333-345. DOI: 10.1109/Tifs.2011.2165540  0.396
2011 Zhang J, Tang Y, Hirve S, Iyer S, Schaumont P, Yang Y. SUNSHINE: a multi-domain sensor network simulator Mobile Computing and Communications Review. 14: 40-42. DOI: 10.1145/1942268.1942283  0.408
2011 Chen Z, Schaumont P. A Parallel Implementation of Montgomery Multiplication on Multicore Systems: Algorithm, Analysis, and Prototype Ieee Transactions On Computers. 60: 1692-1703. DOI: 10.1109/Tc.2010.256  0.414
2011 Maiti A, Schaumont P. Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive Journal of Cryptology. 24: 375-397. DOI: 10.1007/S00145-010-9088-4  0.335
2010 Guo X, Schaumont P. Optimized System-on-Chip Integration of a Programmable ECC Coprocessor Acm Transactions On Reconfigurable Technology and Systems. 4: 6. DOI: 10.1145/1857927.1857933  0.471
2010 Gora MA, Maiti A, Schaumont P. A Flexible Design Flow for Software IP Binding in FPGA Ieee Transactions On Industrial Informatics. 6: 719-728. DOI: 10.1109/Tii.2010.2068303  0.476
2009 Schaumont PR, Jones AK, Trimberger S. Guest editors' introduction to security in reconfigurable systems design Acm Transactions On Reconfigurable Technology and Systems. 2. DOI: 10.1145/1502781.1502782  0.504
2009 Knobler R, Fish R, Jones B, Schaumont P, Gora M. Security concerns and solutions for unattended ground sensors Proceedings of Spie - the International Society For Optical Engineering. 7333. DOI: 10.1117/12.818759  0.408
2008 Schaumont P. A Senior-Level Course in Hardware–Software Codesign Ieee Transactions On Education. 51: 306-311. DOI: 10.1109/Te.2007.910434  0.387
2008 Schaumont P, Asanovic K, Hoe JC. CEDA currents: IEEE/ACM MEMOCODE Contest Update Ieee Solid-State Circuits Newsletter. 13: 66-67. DOI: 10.1109/N-Ssc.2008.4785841  0.381
2007 Schaumont P, Raghunathan A. Guest editors' introduction: Security and trust in embedded-systems design Ieee Design and Test of Computers. 24: 518-520. DOI: 10.1109/Mdt.2007.188  0.539
2006 Schaumont P, Ching D, Verbauwhede I. An interactive codesign environment for domain-specific coprocessors Acm Transactions On Design Automation of Electronic Systems. 11: 70-87. DOI: 10.1145/1124713.1124719  0.584
2006 Hwang DD, Tiri K, Hodjat A, Lai BC, Yang S, Schaumont P, Verbauwhede I. AES-based security coprocessor IC in 0.18-μm CMOS with resistance to differential power analysis side-channel attacks Ieee Journal of Solid-State Circuits. 41: 781-790. DOI: 10.1109/Jssc.2006.870913  0.509
2005 Ching D, Schaumont P, Verbauwhede I. Integrated modelling and generation of a reconfigurable network-on-chip International Journal of Embedded Systems. 1: 218-227. DOI: 10.1504/Ijes.2005.009951  0.562
2005 Verbauwhede I, Schaumont P. Skiing the embedded systems mountain Acm Transactions in Embedded Computing Systems. 4: 529-548. DOI: 10.1145/1086519.1086523  0.6
2005 Schaumont P, Hwang D, Verbauwhede I. Platform-based design for an embedded-fingerprint-authentication device Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 24: 1929-1936. DOI: 10.1109/Tcad.2005.853709  0.651
2003 Schaumont P, Verbauwhede I. Domain-specific codesign for embedded security Ieee Computer. 36: 68-74. DOI: 10.1109/Mc.2003.1193231  0.621
2003 Verbauwhede I, Schaumont P, Kuo H. Design and performance testing of a 2.29-GB/s Rijndael processor Ieee Journal of Solid-State Circuits. 38: 569-572. DOI: 10.1109/Jssc.2002.808300  0.619
2002 Schaumont P, Verbauwhede I. Domain Specific Tools and Methods for Application in Security Processor Design Design Automation For Embedded Systems. 7: 365-383. DOI: 10.1023/A:1020363323869  0.611
2002 Schaumont PR, Kuo H, Verbauwhede IM. Unlocking the design secrets of a 2.29 GB/s Rijndael processor Proceedings - Design Automation Conference. 634-639.  0.341
2001 Paško R, Rijnders L, Schaumont PR, Vernalde SA, Ďuračková D. High-performance/flexible all-digital quadrature up and down converter chip Ieee Journal of Solid-State Circuits. 36: 408-416. DOI: 10.1109/4.910479  0.384
1999 Pasko R, Schaumont P, Derudder V, Vernalde S, Durackova D. A new algorithm for elimination of common subexpressions Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 18: 58-68. DOI: 10.1109/43.739059  0.344
1997 Schaumont P, Vanthournout B, Bolsens I, Man HJD. Synthesis of pipelined DSP accelerators with dynamic scheduling Ieee Transactions On Very Large Scale Integration Systems. 5: 59-68. DOI: 10.1109/92.555987  0.377
Show low-probability matches.