Shakya, Bicky
16  results:
Search for persons X
?
1

Covert Gates: Protecting Integrated Circuits with Undetecta..:

Shakya, Bicky ; Shen, Haoting ; Tehranipoor, Mark.
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2019
 
?
2

CAS-Lock: A Security-Corruptibility Trade-off Resilient Log..:

Shakya, Bicky ; Xu, Xiaolin ; Tehranipoor, Mark.
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2019
 
?
3

Resistance Drift and Crystallization in Suspended and On-ox..:

, In: 2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO),
Gorbenko, Anna ; Noor, Nafisa ; Muneer, Sadid... - p. 417-420 , 2019
 
?
4

Electronics Supply Chain Integrity Enabled by Blockchain:

Xu, Xiaolin ; Rahman, Fahim ; Shakya, Bicky...
ACM Transactions on Design Automation of Electronic Systems.  24 (2019)  3 - p. 1-25 , 2019
 
?
5

Electronics Supply Chain Integrity Enabled by Blockchain:

Xu, Xiaolin ; Rahman, Fahim ; Shakya, Bicky...
ACM Transactions on Design Automation of Electronic Systems (TODAES).  24 (2019)  3 - p. 1-25 , 2019
 
?
6

Development and Evaluation of Hardware Obfuscation Benchmar..:

Amir, Sarah ; Shakya, Bicky ; Xu, Xiaolin...
Journal of Hardware and Systems Security.  2 (2018)  2 - p. 142-161 , 2018
 
?
7

Benchmarking of Hardware Trojans and Maliciously Affected C..:

Shakya, Bicky ; He, Tony ; Salmani, Hassan...
Journal of Hardware and Systems Security.  1 (2017)  1 - p. 85-102 , 2017
 
?
8

Comparative Analysis of Hardware Obfuscation for IP Protect..:

, In: Proceedings of the Great Lakes Symposium on VLSI 2017,
Amir, Sarah ; Shakya, Bicky ; Forte, Domenic.. - p. 363-368 , 2017
 
?
9

Poly-Si-Based Physical Unclonable Functions:

Shen, Haoting ; Rahman, Fahim ; Shakya, Bicky...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  25 (2017)  11 - p. 3207-3217 , 2017
 
?
10

Security Beyond CMOS: Fundamentals, Applications, and Roadm..:

Rahman, Fahim ; Shakya, Bicky ; Xu, Xiaolin..
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  25 (2017)  12 - p. 3420-3433 , 2017
 
?
11

Chip editor : leveraging circuit edit for logic obfuscat..:

, In: Proceedings of the 35th International Conference on Computer-Aided Design,
 
?
12

CAS-Lock: A Security-Corruptibility Trade-off Resilient Log..:

Shakya, Bicky ; Xu, Xiaolin ; Tehranipoor, Mark.
https://tches.iacr.org/index.php/TCHES/article/view/8397/7781.  , 2019
 
?
13

Covert Gates: Protecting Integrated Circuits with Undetecta..:

Shakya, Bicky ; Shen, Haoting ; Tehranipoor, Mark.
https://tches.iacr.org/index.php/TCHES/article/view/8290/7640.  , 2019
 
?
15

CAS-Lock: A Security-Corruptibility Trade-off Resilient Log..:

Bicky Shakya ; Xiaolin Xu ; Mark Tehranipoor.
https://tches.iacr.org/index.php/TCHES/article/view/8397.  , 2019
 
1-15