
Aydin Aysu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j7]Erdem Ozcan, Aydin Aysu:
High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems. IEEE Embed. Syst. Lett. 12(4): 133-136 (2020) - [c28]Ahmet Can Mert
, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Michela Becchi, Aydin Aysu:
A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography. DATE 2020: 346-351 - [c27]Emre Karabulut, Aydin Aysu:
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform. FPL 2020: 26-32 - [c26]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection. HOST 2020: 197-208 - [c25]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
BoMaNet: Boolean Masking of an Entire Neural Network. ICCAD 2020: 51:1-51:9 - [c24]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c23]Qinhan Tan, Seetal Potluri, Aydin Aysu:
Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors. ISCAS 2020: 1-5 - [c22]Seetal Potluri, Aydin Aysu, Akash Kumar:
SeqL: Secure Scan-Locking for IP Protection. ISQED 2020: 7-13 - [c21]Furkan Aydin, Priyank Kashyap, Seetal Potluri, Paul Franzon, Aydin Aysu:
DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks. SAMOS 2020: 262-280 - [i10]Seetal Potluri, Aydin Aysu, Akash Kumar:
SeqL: Secure Scan-Locking for IP Protection. CoRR abs/2005.13032 (2020) - [i9]Qinhan Tan, Seetal Potluri, Aydin Aysu:
Efficacy of Satisfiability Based Attacks in the Presence of Circuit Reverse Engineering Errors. CoRR abs/2005.13048 (2020) - [i8]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
BoMaNet: Boolean Masking of an Entire Neural Network. CoRR abs/2006.09532 (2020) - [i7]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler
, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020)
2010 – 2019
- 2019
- [c20]Abdullah Varici, Gurol Saglam, Seckin Ipek, Abdullah Yildiz, Sezer Gören, Aydin Aysu, Deniz Iskender, T. Baris Aktemur, H. Fatih Ugurdag:
Fast and Efficient Implementation of Lightweight Crypto Algorithm PRESENT on FPGA through Processor Instruction Set Extension. EWDTS 2019: 1-5 - [c19]Aydin Aysu:
Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers. ACM Great Lakes Symposium on VLSI 2019: 237-242 - [c18]Shijia Wei, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer, Mohit Tiwari:
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems. HOST 2019: 111-120 - [i6]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
MaskedNet: A Pathway for Secure Inference against Power Side-Channel Attacks. CoRR abs/1910.13063 (2019) - [i5]Seetal Potluri, Akash Kumar, Aydin Aysu:
SeqL: SAT-attack Resilient Sequential Locking. IACR Cryptol. ePrint Arch. 2019: 656 (2019) - 2018
- [c17]Aydin Aysu, Michael Orshansky, Mohit Tiwari:
Binary Ring-LWE hardware with power side-channel countermeasures. DATE 2018: 1253-1258 - [c16]Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky:
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. HOST 2018: 81-88 - [c15]Xiaodan Xi, Aydin Aysu, Michael Orshansky:
Fresh re-keying with strong PUFs: A new approach to side-channel security. HOST 2018: 118-125 - 2017
- [c14]Aydin Aysu, Ye Wang, Patrick Schaumont
, Michael Orshansky:
A new maskless debiasing method for lightweight physical unclonable functions. HOST 2017: 134-139 - 2016
- [j6]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont
:
Compact and low-power ASIP design for lightweight PUF-based authentication protocols. IET Inf. Secur. 10(5): 232-241 (2016) - [j5]Aydin Aysu, Patrick Schaumont
:
Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms. IEEE Trans. Computers 65(9): 2925-2931 (2016) - [c13]Aydin Aysu, Shravya Gaddam, Harsha Mandadi, Carol Pinto, Luke Wegryn, Patrick Schaumont
:
A design method for remote integrity checking of complex PCBs. DATE 2016: 1517-1522 - [c12]Christopher Huth
, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu
:
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. ICISC 2016: 28-48 - 2015
- [j4]Aydin Aysu, Patrick Schaumont
:
Hardware/software co-design of physical unclonable function based authentications on FPGAs. Microprocess. Microsystems 39(7): 589-597 (2015) - [j3]Aydin Aysu, Bilgiday Yuce, Patrick Schaumont
:
The Future of Real-Time Security: Latency-Optimized Lattice-Based Digital Signatures. ACM Trans. Embed. Comput. Syst. 14(3): 43:1-43:18 (2015) - [c11]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. CHES 2015: 556-576 - [c10]Ege Gulcan, Aydin Aysu, Patrick Schaumont:
BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications. INDOCRYPT 2015: 329-346 - [i4]Aydin Aysu, Patrick Schaumont
:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. IACR Cryptol. ePrint Arch. 2015: 288 (2015) - [i3]Ege Gulcan, Aydin Aysu, Patrick Schaumont
:
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2015: 744 (2015) - [i2]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont
, Moti Yung:
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol. IACR Cryptol. ePrint Arch. 2015: 937 (2015) - 2014
- [j2]Aydin Aysu, Ege Gulcan, Patrick Schaumont
:
SIMON Says: Break Area Records of Block Ciphers on FPGAs. IEEE Embed. Syst. Lett. 6(2): 37-40 (2014) - [c9]Nahid Farhady Ghalaty, Aydin Aysu, Patrick Schaumont
:
Analyzing and eliminating the causes of fault sensitivity analysis. DATE 2014: 1-6 - [c8]Ilker Hamzaoglu, Aydin Aysu, Onur Can Ulusel:
A low power adaptive H.264 video encoder hardware. ICCE-Berlin 2014: 395-399 - [c7]Ege Gulcan, Aydin Aysu, Patrick Schaumont:
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher. LightSec 2014: 34-50 - [i1]Aydin Aysu, Ege Gulcan, Patrick Schaumont
:
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs. IACR Cryptol. ePrint Arch. 2014: 237 (2014) - 2013
- [c6]Aydin Aysu, Nahid Farhady Ghalaty, Zane R. Franklin, Moein Pahlavan Yali, Patrick Schaumont
:
Digital fingerprints for low-cost platforms using MEMS sensors. WESS 2013: 2:1-2:6 - [c5]Aydin Aysu, Cameron Patterson, Patrick Schaumont
:
Low-cost and area-efficient FPGA implementations of lattice-based cryptography. HOST 2013: 81-86 - [c4]Aydin Aysu, Patrick Schaumont
:
PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs. ReConFig 2013: 1-6 - [c3]Patrick Schaumont, Aydin Aysu:
Three Design Dimensions of Secure Embedded Systems. SPACE 2013: 1-20 - [c2]Aydin Aysu, Murat Sayinta, Cevahir Cigla:
Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications. VLSI-SoC 2013: 204-209 - 2011
- [j1]Aydin Aysu, Gokhan Sayilar, Ilker Hamzaoglu:
A low energy adaptive hardware for H.264 multiple reference frame motion estimation. IEEE Trans. Consumer Electron. 57(3): 1377-1383 (2011) - 2010
- [c1]Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas:
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. SIN 2010: 168-177
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-25 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint