Preventing IC piracy using reconfigurable logic barriers A Baumgarten, A Tyagi, J Zambreno IEEE design & Test of computers 27 (1), 66-75, 2010 | 446 | 2010 |
A reduced-area scheme for carry-select adders A Tyagi IEEE Transactions on Computers 42 (10), 1163-1170, 1993 | 375 | 1993 |
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System M Gomathisankaran, A Tyagi, K Namuduri 2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011 | 101 | 2011 |
A reconfigurable multi-function computing cache architecture HS Kim, AK Somani, A Tyagi Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field …, 2000 | 85 | 2000 |
Control flow based obfuscation J Ge, S Chaudhuri, A Tyagi Proceedings of the 5th ACM workshop on Digital rights management, 83-92, 2005 | 74 | 2005 |
Hercules: a power analyzer for MOS VLSI circuits A Tyagi NASA STI/Recon Technical Report N 88, 19706, 1987 | 52 | 1987 |
Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly J Park, A Tyagi IEEE Consumer Electronics Magazine 6 (3), 92-102, 2017 | 49 | 2017 |
Efficient parallel algorithms for optical computing with the discrete Fourier transform (DFT) primitive JH Reif, A Tyagi Applied optics 36 (29), 7327-7340, 1997 | 47 | 1997 |
Protection against indirect overflow attacks on pointers G Zhu, A Tyagi Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004 | 42 | 2004 |
Low power FSM design using Huffman-style encoding P Surti, LF Chao, A Tyagi Proceedings European Design and Test Conference. ED & TC 97, 521-525, 1997 | 39 | 1997 |
Re-encoding for low power state assignment of FSMs V Veeramachaneni, A Tyagi, S Rajgopal Proceedings of the 1995 international symposium on Low power design, 173-178, 1995 | 32 | 1995 |
Configuration caching vs data caching for striped FPGAs D Deshpande, AK Somani, A Tyagi Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999 | 28 | 1999 |
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks. G Lee, A Tyagi International Conference on Internet Computing, 387-394, 2000 | 27 | 2000 |
A novel charge recycling design scheme based on adiabatic charge pump KM Keung, V Manne, A Tyagi IEEE transactions on very large scale integration (VLSI) systems 15 (7), 733-745, 2007 | 26 | 2007 |
Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication RA Scheel, A Tyagi Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015 | 25 | 2015 |
Continuous transparent mobile device touchscreen soft keyboard biometric authentication T Dee, I Richardson, A Tyagi 2019 32nd international conference on vlsi design and 2019 18th …, 2019 | 23 | 2019 |
GEEP: a low power genetic algorithm layout system G Holt, A Tyagi Proceedings of the 39th Midwest Symposium on Circuits and Systems 3, 1337-1340, 1996 | 23 | 1996 |
Barrel shifter physical unclonable function based encryption Y Guo, T Dee, A Tyagi Cryptography 2 (3), 22, 2018 | 20 | 2018 |
Energy-time trade-offs in VLSI computations A Tyagi International Conference on Foundations of Software Technology and …, 1989 | 19 | 1989 |
Preventing integrated circuit piracy using reconfigurable logic barriers AC Baumgarten Iowa State University, 2009 | 17 | 2009 |