Year |
Citation |
Score |
2020 |
Kiaei P, Schaumont P. Synthesis of Parallel Synchronous Software Ieee Embedded Systems Letters. 1-1. DOI: 10.1109/Les.2020.2992051 |
0.402 |
|
2019 |
Yuce B, Deshpande C, Ghodrati M, Bendre A, Nazhandali L, Schaumont P. A Secure Exception Mode for Fault-Attack-Resistant Processing Ieee Transactions On Dependable and Secure Computing. 16: 388-401. DOI: 10.1109/Tdsc.2018.2823767 |
0.437 |
|
2018 |
Schaumont P, Lee R, Perez R, Bertoni G. Special Section on Secure Computer Architectures Ieee Transactions On Computers. 67: 305-306. DOI: 10.1109/Tc.2017.2788658 |
0.421 |
|
2018 |
Mulder ED, Eisenbarth T, Schaumont P. Identifying and Eliminating Side-Channel Leaks in Programmable Systems Ieee Design & Test of Computers. 35: 74-89. DOI: 10.1109/Mdat.2017.2766166 |
0.369 |
|
2018 |
Schaumont P, Montuschi P. The Rise of Hardware Security in Computer Architectures Ieee Computer. 51: 4-5. DOI: 10.1109/Mc.2018.3191252 |
0.467 |
|
2018 |
Yuce B, Schaumont P, Witteman M. Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation Arxiv: Cryptography and Security. 2: 111-130. DOI: 10.1007/S41635-018-0038-1 |
0.355 |
|
2018 |
Krishnan AS, Schaumont P. Exploiting Security Vulnerabilities in Intermittent Computing. Space. 104-124. DOI: 10.1007/978-3-030-05072-6_7 |
0.417 |
|
2017 |
Rawat H, Schaumont P. Vector Instruction Set Extensions for Efficient Computation of Keccak Ieee Transactions On Computers. 66: 1778-1789. DOI: 10.1109/Tc.2017.2700795 |
0.415 |
|
2016 |
Aysu A, Schaumont P. Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms Ieee Transactions On Computers. 65: 2925-2931. DOI: 10.1109/Tc.2015.2500570 |
0.364 |
|
2016 |
Aysu A, Gulcan E, Moriyama D, Schaumont P. Compact and low-power ASIP design for lightweight PUF-based authentication protocols Iet Information Security. 10: 232-241. DOI: 10.1049/Iet-Ifs.2015.0401 |
0.506 |
|
2016 |
Schaumont P, Yuce B, Pabbuleti KC, Mane DH. Secure authentication with energy-harvesting: A multi-dimensional balancing act Sustainable Computing: Informatics and Systems. 12: 83-95. DOI: 10.1016/J.Suscom.2015.10.002 |
0.38 |
|
2015 |
Taha M, Schaumont P. Key Updating for Leakage Resiliency With Application to AES Modes of Operation Ieee Transactions On Information Forensics and Security. 10: 519-528. DOI: 10.1109/Tifs.2014.2383359 |
0.484 |
|
2015 |
Eldib H, Wang C, Taha M, Schaumont P. Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 1558-1568. DOI: 10.1109/Tcad.2015.2424951 |
0.485 |
|
2015 |
Aysu A, Schaumont P. Hardware/software co-design of physical unclonable function based authentications on FPGAs Microprocessors and Microsystems. 39: 589-597. DOI: 10.1016/J.Micpro.2015.04.001 |
0.496 |
|
2014 |
Eldib H, Wang C, Schaumont P. Formal Verification of Software Countermeasures against Side-Channel Attacks Acm Transactions On Software Engineering and Methodology. 24: 11. DOI: 10.1145/2685616 |
0.536 |
|
2014 |
Maiti A, Schaumont P. The impact of aging on a physical unclonable function Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 22: 1854-1864. DOI: 10.1109/Tvlsi.2013.2279875 |
0.307 |
|
2014 |
Aysu A, Gulcan E, Schaumont P. SIMON Says: Break Area Records of Block Ciphers on FPGAs Ieee Embedded Systems Letters. 6: 37-40. DOI: 10.1109/Les.2014.2314961 |
0.414 |
|
2013 |
Chen Z, Sinha A, Schaumont P. Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks Ieee Transactions On Computers. 62: 124-136. DOI: 10.1109/Tc.2011.225 |
0.592 |
|
2013 |
Srivastav M, Guo X, Huang S, Ganta D, Henry MB, Nazhandali L, Schaumont P. Design and benchmarking of an ASIC with five SHA-3 finalist candidates Microprocessors and Microsystems. 37: 246-257. DOI: 10.1016/J.Micpro.2012.09.001 |
0.452 |
|
2013 |
Prouff E, Schaumont P. Introduction to the CHES 2012 special issue Journal of Cryptographic Engineering. 3: 1-1. DOI: 10.1007/S13389-013-0055-5 |
0.453 |
|
2013 |
Schaumont P, Aysu A. Three Design Dimensions of Secure Embedded Systems Space. 1-20. DOI: 10.1007/978-3-642-41224-0_1 |
0.413 |
|
2012 |
Maiti A, Kim I, Schaumont P. A robust physical unclonable function with enhanced challenge-response set Ieee Transactions On Information Forensics and Security. 7: 333-345. DOI: 10.1109/Tifs.2011.2165540 |
0.396 |
|
2011 |
Zhang J, Tang Y, Hirve S, Iyer S, Schaumont P, Yang Y. SUNSHINE: a multi-domain sensor network simulator Mobile Computing and Communications Review. 14: 40-42. DOI: 10.1145/1942268.1942283 |
0.408 |
|
2011 |
Chen Z, Schaumont P. A Parallel Implementation of Montgomery Multiplication on Multicore Systems: Algorithm, Analysis, and Prototype Ieee Transactions On Computers. 60: 1692-1703. DOI: 10.1109/Tc.2010.256 |
0.414 |
|
2011 |
Maiti A, Schaumont P. Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive Journal of Cryptology. 24: 375-397. DOI: 10.1007/S00145-010-9088-4 |
0.335 |
|
2010 |
Guo X, Schaumont P. Optimized System-on-Chip Integration of a Programmable ECC Coprocessor Acm Transactions On Reconfigurable Technology and Systems. 4: 6. DOI: 10.1145/1857927.1857933 |
0.471 |
|
2010 |
Gora MA, Maiti A, Schaumont P. A Flexible Design Flow for Software IP Binding in FPGA Ieee Transactions On Industrial Informatics. 6: 719-728. DOI: 10.1109/Tii.2010.2068303 |
0.476 |
|
2009 |
Schaumont PR, Jones AK, Trimberger S. Guest editors' introduction to security in reconfigurable systems design Acm Transactions On Reconfigurable Technology and Systems. 2. DOI: 10.1145/1502781.1502782 |
0.504 |
|
2009 |
Knobler R, Fish R, Jones B, Schaumont P, Gora M. Security concerns and solutions for unattended ground sensors Proceedings of Spie - the International Society For Optical Engineering. 7333. DOI: 10.1117/12.818759 |
0.408 |
|
2008 |
Schaumont P. A Senior-Level Course in Hardware–Software Codesign Ieee Transactions On Education. 51: 306-311. DOI: 10.1109/Te.2007.910434 |
0.387 |
|
2008 |
Schaumont P, Asanovic K, Hoe JC. CEDA currents: IEEE/ACM MEMOCODE Contest Update Ieee Solid-State Circuits Newsletter. 13: 66-67. DOI: 10.1109/N-Ssc.2008.4785841 |
0.381 |
|
2007 |
Schaumont P, Raghunathan A. Guest editors' introduction: Security and trust in embedded-systems design Ieee Design and Test of Computers. 24: 518-520. DOI: 10.1109/Mdt.2007.188 |
0.539 |
|
2006 |
Schaumont P, Ching D, Verbauwhede I. An interactive codesign environment for domain-specific coprocessors Acm Transactions On Design Automation of Electronic Systems. 11: 70-87. DOI: 10.1145/1124713.1124719 |
0.584 |
|
2006 |
Hwang DD, Tiri K, Hodjat A, Lai BC, Yang S, Schaumont P, Verbauwhede I. AES-based security coprocessor IC in 0.18-μm CMOS with resistance to differential power analysis side-channel attacks Ieee Journal of Solid-State Circuits. 41: 781-790. DOI: 10.1109/Jssc.2006.870913 |
0.509 |
|
2005 |
Ching D, Schaumont P, Verbauwhede I. Integrated modelling and generation of a reconfigurable network-on-chip International Journal of Embedded Systems. 1: 218-227. DOI: 10.1504/Ijes.2005.009951 |
0.562 |
|
2005 |
Verbauwhede I, Schaumont P. Skiing the embedded systems mountain Acm Transactions in Embedded Computing Systems. 4: 529-548. DOI: 10.1145/1086519.1086523 |
0.6 |
|
2005 |
Schaumont P, Hwang D, Verbauwhede I. Platform-based design for an embedded-fingerprint-authentication device Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 24: 1929-1936. DOI: 10.1109/Tcad.2005.853709 |
0.651 |
|
2003 |
Schaumont P, Verbauwhede I. Domain-specific codesign for embedded security Ieee Computer. 36: 68-74. DOI: 10.1109/Mc.2003.1193231 |
0.621 |
|
2003 |
Verbauwhede I, Schaumont P, Kuo H. Design and performance testing of a 2.29-GB/s Rijndael processor Ieee Journal of Solid-State Circuits. 38: 569-572. DOI: 10.1109/Jssc.2002.808300 |
0.619 |
|
2002 |
Schaumont P, Verbauwhede I. Domain Specific Tools and Methods for Application in Security Processor Design Design Automation For Embedded Systems. 7: 365-383. DOI: 10.1023/A:1020363323869 |
0.611 |
|
2002 |
Schaumont PR, Kuo H, Verbauwhede IM. Unlocking the design secrets of a 2.29 GB/s Rijndael processor Proceedings - Design Automation Conference. 634-639. |
0.341 |
|
2001 |
Paško R, Rijnders L, Schaumont PR, Vernalde SA, Ďuračková D. High-performance/flexible all-digital quadrature up and down converter chip Ieee Journal of Solid-State Circuits. 36: 408-416. DOI: 10.1109/4.910479 |
0.384 |
|
1999 |
Pasko R, Schaumont P, Derudder V, Vernalde S, Durackova D. A new algorithm for elimination of common subexpressions Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 18: 58-68. DOI: 10.1109/43.739059 |
0.344 |
|
1997 |
Schaumont P, Vanthournout B, Bolsens I, Man HJD. Synthesis of pipelined DSP accelerators with dynamic scheduling Ieee Transactions On Very Large Scale Integration Systems. 5: 59-68. DOI: 10.1109/92.555987 |
0.377 |
|
Show low-probability matches. |