Khan, Mohammad Nasim
1365  Ergebnisse:
Personensuche X
?
5

Comprehensive Study of Side-Channel Attack on Emerging Non-..:

Khan, Mohammad Nasim Imtiaz ; Bhasin, Shivam ; Liu, Bo...
Journal of Low Power Electronics and Applications.  11 (2021)  4 - p. 38 , 2021
 
?
6

Comprehensive Study of Security and Privacy of Emerging Non..:

Khan, Mohammad Nasim Imtiaz ; Ghosh, Swaroop
Journal of Low Power Electronics and Applications.  11 (2021)  4 - p. 36 , 2021
 
?
7

SCARE: Side Channel Attack on In-Memory Computing for Rever..:

Sayyah Ensan, Sina ; Nagarajan, Karthikeyan ; Khan, Mohammad Nasim Imtiaz.
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  29 (2021)  12 - p. 2040-2051 , 2021
 
?
8

A Morphable Physically Unclonable Function and True Random ..:

Khan, Mohammad Nasim Imtiaz ; Cheng, Chak Yuen ; Lin, Sung Hao..
Journal of Low Power Electronics and Applications.  11 (2021)  1 - p. 5 , 2021
 
?
9

SecNVM: Power Side-Channel Elimination Using On-Chip Capaci..:

Nagarajan, Karthikeyan ; Ahmed, Farid Uddin ; Khan, Mohammad Nasim Imtiaz...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  29 (2021)  8 - p. 1518-1528 , 2021
 
?
10

Reconfigurable and Dense Analog Circuit Design Using Two Te..:

Ash-Saki, Abdullah ; Khan, Mohammad Nasim Imtiaz ; Ghosh, Swaroop
IEEE Transactions on Emerging Topics in Computing.  9 (2021)  3 - p. 1596-1608 , 2021
 
?
 
?
12

Cache-Out: Leaking Cache Memory Using Hardware Trojan:

Khan, Mohammad Nasim Imtaiz ; De, Asmit ; Ghosh, Swaroop
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  28 (2020)  6 - p. 1461-1470 , 2020
 
?
13

A Morphable Physically Unclonable Function and True Random ..:

, In: 2020 21st International Symposium on Quality Electronic Design (ISQED),
 
?
14

Power side channel attack analysis and detection:

, In: Proceedings of the 39th International Conference on Computer-Aided Design,
 
?
15

Fault injection attacks on emerging non-volatile memory and..:

, In: Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy,
 
1-15
Mehr Literatur finden