DPA-secured quasi-adiabatic logic (SQAL) for low-power passive RFID tags employing S-boxes M Avital, H Dagan, I Levi, O Keren, A Fish IEEE Transactions on Circuits and Systems I: Regular Papers 62 (1), 149-156, 2014 | 78 | 2014 |
A method to improve reliability in a 65-nm SRAM PUF array Y Shifman, A Miller, O Keren, Y Weizmann, J Shor IEEE Solid-State Circuits Letters 1 (6), 138-141, 2018 | 56 | 2018 |
An SRAM-based PUF with a capacitive digital preselection for a 1E-9 key error probability Y Shifman, A Miller, O Keren, Y Weizman, J Shor IEEE Transactions on Circuits and Systems I: Regular Papers 67 (12), 4855-4868, 2020 | 45 | 2020 |
Robust generalized punctured cubic codes Y Neumeier, O Keren IEEE Transactions on Information Theory 60 (5), 2813-2822, 2014 | 40* | 2014 |
Leakage power attack-resilient symmetrical 8T SRAM cell R Giterman, M Vicentowski, I Levi, Y Weizman, O Keren, A Fish IEEE Transactions on very large scale integration (VLSI) systems 26 (10 …, 2018 | 39 | 2018 |
Data-dependent delays as a barrier against power attacks I Levi, O Keren, A Fish IEEE Transactions on Circuits and Systems I: Regular Papers 62 (8), 2069-2078, 2015 | 35 | 2015 |
Designing fault tolerant FSM by nano-PLA S Baranov, I Levin, O Keren, M Karpovsky 2009 15th IEEE International On-Line Testing Symposium, 229-234, 2009 | 35 | 2009 |
Reduction of average path length in binary decision diagrams by spectral methods O Keren IEEE Transactions on Computers 57 (4), 520-531, 2008 | 34 | 2008 |
A 7T security oriented SRAM bitcell R Giterman, O Keren, A Fish IEEE Transactions on Circuits and Systems II: Express Briefs 66 (8), 1396-1400, 2018 | 33 | 2018 |
Randomized multitopology logic against differential power analysis M Avital, H Dagan, O Keren, A Fish IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23 (4), 702-711, 2014 | 33 | 2014 |
Puncturing, expurgating and expanding the q-ary BCH based robust codes N Admaty, S Litsyn, O Keren 2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, 1-5, 2012 | 30 | 2012 |
Protecting cryptographic hardware against malicious attacks by nonlinear robust codes V Tomashevich, Y Neumeier, R Kumar, O Keren, I Polian 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2014 | 29 | 2014 |
More on the distance distribution of BCH codes O Keren, S Litsyn IEEE Transactions on Information Theory 45 (1), 251-255, 1999 | 28 | 1999 |
CPA secured data-dependent delay-assignment methodology I Levi, A Fish, O Keren IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (2), 608-620, 2016 | 24 | 2016 |
Low-cost pseudoasynchronous circuit design style with reduced exploitable side information I Levi, A Fish, O Keren IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (1), 82-95, 2017 | 22 | 2017 |
A comment on the Karpovsky–Taubin code S Engelberg, O Keren IEEE transactions on information theory 57 (12), 8007-8010, 2011 | 21 | 2011 |
The Effect of Ultraviolet Radiation and Sucrose on IAA Levels in Spirodela oligorhiza A Witztum, O Keren, Z Even-Chen Annals of Botany 42 (3), 595-598, 1978 | 21 | 1978 |
CMOS based gates for blurring power information M Avital, I Levi, O Keren, A Fish IEEE Transactions on Circuits and Systems I: Regular Papers 63 (7), 1033-1042, 2016 | 20 | 2016 |
A class of array codes correcting multiple column erasures O Keren, S Litsyn IEEE Transactions on Information Theory 43 (6), 1843-1851, 1997 | 19 | 1997 |
High rate robust codes with low implementation complexity H Rabii, Y Neumeier, O Keren IEEE Transactions on Dependable and Secure Computing 16 (3), 511-520, 2018 | 18 | 2018 |