Ngo, Xuan Thuy
1951  results:
Search for persons X
?
1

The Conflicted Usage of RLUTs for Security-Critical Applica..:

Roy, Debapriya Basu ; Bhasin, Shivam ; Danger, Jean-Luc...
Journal of Hardware and Systems Security.  2 (2018)  2 - p. 162-178 , 2018
 
?
2

PLL to the rescue : a novel EM fault countermeasure:

, In: Proceedings of the 53rd Annual Design Automation Conference,
Miura, Noriyuki ; Najm, Zakaria ; He, Wei... - p. 1-6 , 2016
 
?
3

Method taking into account process dispersion to detect har..:

Ngo, Xuan Thuy ; Najm, Zakaria ; Bhasin, Shivam..
Journal of Cryptographic Engineering.  6 (2016)  3 - p. 239-247 , 2016
 
?
4

Linear complementary dual code improvement to strengthen en..:

, In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
5

A PUF Based on a Transient Effect Ring Oscillator and Insen..:

Bossuet, Lilian ; Ngo, Xuan Thuy ; Cherif, Zouha.
IEEE Transactions on Emerging Topics in Computing.  2 (2014)  1 - p. 30-36 , 2014
 
?
6

Encoding the state of integrated circuits : a proactive ..:

, In: Proceedings of the 9th Workshop on Embedded Systems Security,
 
?
7

Machine Learning Based Hardware Trojan Detection Using Elec..:

TAKAHASHI, Junko ; OKABE, Keiichi ; ITOH, Hiroki...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E105.A (2022)  3 - p. 311-325 , 2022
 
?
8

Machine Learning Based Hardware Trojan Detection Using Elec..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Takahashi, Junko ; Okabe, Keiichi ; Itoh, Hiroki... - p. 3-19 , 2020
 
?
10

Integrated Sensor: A Backdoor for Hardware Trojan Insertion..:

Ngo, Xuan Thuy ; Najm, Zakaria ; Bhasin, Shivam...
info:eu-repo/semantics/altIdentifier/doi/10.1109/DSD.2015.119.  , 2015
 
?
11

Integrated Sensor: A Backdoor for Hardware Trojan Insertion..:

Ngo, Xuan Thuy ; Najm, Zakaria ; Bhasin, Shivam...
info:eu-repo/semantics/altIdentifier/doi/10.1109/DSD.2015.119.  , 2015
 
?
13

Encoding the State of Integrated Circuits: a Proactive and ..:

Ngo, Xuan Thuy ; Guilley, Sylvain ; Bhasin, Shivam..
info:eu-repo/semantics/altIdentifier/doi/10.1145/2668322.2668329.  , 2014
 
?
14

Hardware Trojan Horses in Cryptographic IP Cores:

Bhasin, Shivam ; Danger, Jean-Luc ; Guilley, Sylvain..
info:eu-repo/semantics/altIdentifier/doi/10.1109/FDTC.2013.15.  , 2013
 
?
15

Modification of a ZSM-5 catalyst by La for use in fluid cat..:

Nguyen, Le-Phuc ; Van Tran, Tri ; Ngo, Phuong Thuy...
Petroleum Science and Technology.  37 (2019)  14 - p. 1713-1721 , 2019
 
1-15