Follow
Akhilesh Tyagi
Title
Cited by
Cited by
Year
Preventing IC piracy using reconfigurable logic barriers
A Baumgarten, A Tyagi, J Zambreno
IEEE design & Test of computers 27 (1), 66-75, 2010
3942010
A reduced-area scheme for carry-select adders
A Tyagi
IEEE Transactions on Computers 42 (10), 1163-1170, 1993
3751993
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System
M Gomathisankaran, A Tyagi, K Namuduri
2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011
822011
A reconfigurable multi-function computing cache architecture
HS Kim, AK Somani, A Tyagi
Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field …, 2000
822000
Control flow based obfuscation
J Ge, S Chaudhuri, A Tyagi
Proceedings of the 5th ACM workshop on Digital rights management, 83-92, 2005
672005
Hercules: a power analyzer for MOS VLSI circuits
A Tyagi
WASHINGTON UNIV SEATTLE NORTHWEST LAB FOR INTEGRATED SYSTEMS, 1987
531987
Efficient parallel algorithms for optical computing with the discrete Fourier transform (DFT) primitive
JH Reif, A Tyagi
Applied optics 36 (29), 7327-7340, 1997
451997
Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly.
J Park, A Tyagi
IEEE Consumer Electronics Magazine 6 (3), 92-102, 2017
412017
Low power FSM design using Huffman-style encoding
P Surti, LF Chao, A Tyagi
Proceedings European Design and Test Conference. ED & TC 97, 521-525, 1997
391997
Protection against indirect overflow attacks on pointers
G Zhu, A Tyagi
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
372004
Re-encoding for low power state assignment of FSMs
V Veeramachaneni, A Tyagi, S Rajgopal
Proceedings of the 1995 international symposium on Low power design, 173-178, 1995
301995
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks.
G Lee, A Tyagi
International Conference on Internet Computing, 387-394, 2000
272000
Configuration caching vs data caching for striped FPGAs
D Deshpande, AK Somani, A Tyagi
Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999
261999
A novel charge recycling design scheme based on adiabatic charge pump
KM Keung, V Manne, A Tyagi
IEEE transactions on very large scale integration (VLSI) systems 15 (7), 733-745, 2007
222007
GEEP: a low power genetic algorithm layout system
G Holt, A Tyagi
Proceedings of the 39th Midwest Symposium on Circuits and Systems 3, 1337-1340, 1996
221996
Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication
RA Scheel, A Tyagi
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
212015
Energy-time trade-offs in VLSI computations
A Tyagi
Foundations of Software Technology and Theoretical Computer Science: Ninth …, 1989
191989
Architecture support for 3d obfuscation
M Gomathisankaran, A Tyagi
IEEE Transactions on Computers 55 (5), 497-507, 2006
172006
Energy complexity of optical computations
A Tyagi, J Reif
Proceedings of the Second IEEE Symposium on Parallel and Distributed …, 1990
171990
Software tamper resistance through dynamic program monitoring
B Blietz, A Tyagi
Digital Rights Management. Technologies, Issues, Challenges and Systems …, 2006
162006
The system can't perform the operation now. Try again later.
Articles 1–20