Follow
Akhilesh Tyagi
Title
Cited by
Cited by
Year
Preventing IC piracy using reconfigurable logic barriers
A Baumgarten, A Tyagi, J Zambreno
IEEE design & Test of computers 27 (1), 66-75, 2010
4462010
A reduced-area scheme for carry-select adders
A Tyagi
IEEE Transactions on Computers 42 (10), 1163-1170, 1993
3751993
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System
M Gomathisankaran, A Tyagi, K Namuduri
2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011
1012011
A reconfigurable multi-function computing cache architecture
HS Kim, AK Somani, A Tyagi
Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field …, 2000
852000
Control flow based obfuscation
J Ge, S Chaudhuri, A Tyagi
Proceedings of the 5th ACM workshop on Digital rights management, 83-92, 2005
742005
Hercules: a power analyzer for MOS VLSI circuits
A Tyagi
NASA STI/Recon Technical Report N 88, 19706, 1987
521987
Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly
J Park, A Tyagi
IEEE Consumer Electronics Magazine 6 (3), 92-102, 2017
492017
Efficient parallel algorithms for optical computing with the discrete Fourier transform (DFT) primitive
JH Reif, A Tyagi
Applied optics 36 (29), 7327-7340, 1997
471997
Protection against indirect overflow attacks on pointers
G Zhu, A Tyagi
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
422004
Low power FSM design using Huffman-style encoding
P Surti, LF Chao, A Tyagi
Proceedings European Design and Test Conference. ED & TC 97, 521-525, 1997
391997
Re-encoding for low power state assignment of FSMs
V Veeramachaneni, A Tyagi, S Rajgopal
Proceedings of the 1995 international symposium on Low power design, 173-178, 1995
321995
Configuration caching vs data caching for striped FPGAs
D Deshpande, AK Somani, A Tyagi
Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999
281999
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks.
G Lee, A Tyagi
International Conference on Internet Computing, 387-394, 2000
272000
A novel charge recycling design scheme based on adiabatic charge pump
KM Keung, V Manne, A Tyagi
IEEE transactions on very large scale integration (VLSI) systems 15 (7), 733-745, 2007
262007
Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication
RA Scheel, A Tyagi
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
252015
Continuous transparent mobile device touchscreen soft keyboard biometric authentication
T Dee, I Richardson, A Tyagi
2019 32nd international conference on vlsi design and 2019 18th …, 2019
232019
GEEP: a low power genetic algorithm layout system
G Holt, A Tyagi
Proceedings of the 39th Midwest Symposium on Circuits and Systems 3, 1337-1340, 1996
231996
Barrel shifter physical unclonable function based encryption
Y Guo, T Dee, A Tyagi
Cryptography 2 (3), 22, 2018
202018
Energy-time trade-offs in VLSI computations
A Tyagi
International Conference on Foundations of Software Technology and …, 1989
191989
Preventing integrated circuit piracy using reconfigurable logic barriers
AC Baumgarten
Iowa State University, 2009
172009
The system can't perform the operation now. Try again later.
Articles 1–20