Follow
Akhilesh Tyagi
Title
Cited by
Cited by
Year
Preventing IC piracy using reconfigurable logic barriers
A Baumgarten, A Tyagi, J Zambreno
IEEE design & Test of computers 27 (1), 66-75, 2010
4262010
A reduced-area scheme for carry-select adders
A Tyagi
IEEE Transactions on Computers 42 (10), 1163-1170, 1993
3711993
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System
M Gomathisankaran, A Tyagi, K Namuduri
2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011
952011
A reconfigurable multi-function computing cache architecture
HS Kim, AK Somani, A Tyagi
Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field …, 2000
852000
Control flow based obfuscation
J Ge, S Chaudhuri, A Tyagi
Proceedings of the 5th ACM workshop on Digital rights management, 83-92, 2005
712005
Hercules: a power analyzer for MOS VLSI circuits
A Tyagi
NASA STI/Recon Technical Report N 88, 19706, 1987
511987
Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly
J Park, A Tyagi
IEEE Consumer Electronics Magazine 6 (3), 92-102, 2017
462017
Efficient parallel algorithms for optical computing with the discrete Fourier transform (DFT) primitive
JH Reif, A Tyagi
Applied optics 36 (29), 7327-7340, 1997
461997
Protection against indirect overflow attacks on pointers
G Zhu, A Tyagi
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
412004
Low power FSM design using Huffman-style encoding
P Surti, LF Chao, A Tyagi
Proceedings European Design and Test Conference. ED & TC 97, 521-525, 1997
391997
Re-encoding for low power state assignment of FSMs
V Veeramachaneni, A Tyagi, S Rajgopal
Proceedings of the 1995 international symposium on Low power design, 173-178, 1995
321995
Configuration caching vs data caching for striped FPGAs
D Deshpande, AK Somani, A Tyagi
Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999
281999
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks.
G Lee, A Tyagi
International Conference on Internet Computing, 387-394, 2000
272000
Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication
RA Scheel, A Tyagi
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
242015
A novel charge recycling design scheme based on adiabatic charge pump
KM Keung, V Manne, A Tyagi
IEEE transactions on very large scale integration (VLSI) systems 15 (7), 733-745, 2007
232007
GEEP: a low power genetic algorithm layout system
G Holt, A Tyagi
Proceedings of the 39th Midwest Symposium on Circuits and Systems 3, 1337-1340, 1996
231996
Continuous transparent mobile device touchscreen soft keyboard biometric authentication
T Dee, I Richardson, A Tyagi
2019 32nd international conference on vlsi design and 2019 18th …, 2019
202019
Energy-time trade-offs in VLSI computations
A Tyagi
International Conference on Foundations of Software Technology and …, 1989
191989
Preventing integrated circuit piracy using reconfigurable logic barriers
AC Baumgarten
Iowa State University, 2009
172009
Developing and teaching an integrated series of courses in embedded computer systems
M Bezdek, D Helvick, R Mercado, D Rover, A Tyagi, Z Zhang
Proceedings. Frontiers in Education. 36th Annual Conference, 19-24, 2006
172006
The system can't perform the operation now. Try again later.
Articles 1–20