Obserwuj
Ali Galip Bayrak
Ali Galip Bayrak
Nieznane powiązanie
Zweryfikowany adres z google.com
Tytuł
Cytowane przez
Cytowane przez
Rok
A first step towards automatic application of power analysis countermeasures
AG Bayrak, F Regazzoni, P Brisk, FX Standaert, P Ienne
Proceedings of the 48th Design Automation Conference, 230-235, 2011
1152011
Sleuth: Automated verification of software power analysis countermeasures
AG Bayrak, F Regazzoni, D Novo, P Ienne
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
992013
Automatic application of power analysis countermeasures
AG Bayrak, F Regazzoni, D Novo, P Brisk, FX Standaert, P Ienne
IEEE Transactions on Computers 64 (2), 329-341, 2013
612013
An architecture-independent instruction shuffler to protect against side-channel attacks
AG Bayrak, N Velickovic, P Ienne, W Burleson
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-19, 2012
612012
An EDA-friendly protection scheme against side-channel attacks
AG Bayrak, N Velickovic, F Regazzoni, D Novo, P Brisk, P Ienne
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 410-415, 2013
242013
Counting stream registers: An efficient and effective snoop filter architecture
A Ranganathan, AG Bayrak, T Kluter, P Brisk, E Charbon, P Ienne
2012 International Conference on Embedded Computer Systems (SAMOS), 120-127, 2012
82012
Formation preserving path finding in 3-D terrains
AG Bayrak, F Polat
Applied Intelligence 36, 348-368, 2012
82012
Automated Side-Channel Vulnerability Discovery and Hardening: No-Cost Security Expertise for All
AG Bayrak
EPFL, 2014
12014
Formation preserving navigation of agent teams in 3-d terrains
AG Bayrak
Middle East Technical University, 2008
12008
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–9