39 results on '"Rangarajan, Nikhil"'
Search Results
2. Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime
3. SMART: Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory
4. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices
5. Introduction
6. Reconfigurability for Static Camouflaging
7. Heterogeneous 2.5D and 3D Integration for Securing Hardware and Data
8. Intrinsic Entropy for True Random Number Generation
9. Resilience Against Side-Channel Attacks in Emerging Technologies
10. Tamper-Proof Hardware from Emerging Technologies
11. Runtime Polymorphism for Dynamic Camouflaging
12. Nonlinearity for Physically Unclonable Functions
13. Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices
14. Solving the stochastic Landau-Lifshitz-Gilbert-Slonczewski equation for monodomain nanomagnets : A survey and analysis of numerical techniques
15. SCANet: Securing the Weights With Superparamagnetic-MTJ Crossbar Array Networks
16. The Next Era in Hardware Security
17. Leveraging Ferroelectric Stochasticity and In-Memory Computing for DNN IP Obfuscation
18. A Novel Attack Mode on Advanced Technology Nodes Exploiting Transistor Self-Heating
19. SCRAMBLE: A Secure and Configurable, Memristor-Based Neuromorphic Hardware Leveraging 3D Architecture
20. PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans
21. FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator
22. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices
23. Toward Security Closure in the Face of Reliability Effects ICCAD Special Session Paper
24. SuperVAULT: Superparamagnetic Volatile Auxiliary Tamper-Proof Storage.
25. SuperVAULT: Superparamagnetic Volatile AUxiLiary Tamper-Proof Storage
26. A spin-based true random number generator exploiting the stochastic precessional switching of nanomagnets.
27. Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime
28. Tamper-Proof Hardware from Emerging Technologies
29. Reconfigurability for Static Camouflaging
30. Nonlinearity for Physically Unclonable Functions
31. Introduction
32. Intrinsic Entropy for True Random Number Generation
33. Runtime Polymorphism for Dynamic Camouflaging
34. Heterogeneous 2.5D and 3D Integration for Securing Hardware and Data
35. Resilience Against Side-Channel Attacks in Emerging Technologies
36. SMART: A Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory
37. Spin-Based Reconfigurable Logic for Power- and Area-Efficient Applications
38. Advancing hardware security using polymorphic and stochastic spin-hall effect devices
39. Energy-Efficient Computing With Probabilistic Magnetic Bits—Performance Modeling and Comparison Against Probabilistic CMOS Logic
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.