Akhilesh Tyagi
Title
Cited by
Cited by
Year
A reduced-area scheme for carry-select adders
A Tyagi
IEEE Transactions on Computers 42 (10), 1163-1170, 1993
3541993
Preventing IC piracy using reconfigurable logic barriers
A Baumgarten, A Tyagi, J Zambreno
IEEE design & Test of computers 27 (1), 66-75, 2010
3082010
A reconfigurable multifunction computing cache architecture
H Kim, AK Somani, A Tyagi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 9 (4), 509-523, 2001
802001
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System
M Gomathisankaran, A Tyagi, K Namuduri
2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011
652011
Control flow based obfuscation
J Ge, S Chaudhuri, A Tyagi
Proceedings of the 5th ACM workshop on Digital rights management, 83-92, 2005
612005
Hercules: a power analyzer for MOS VLSI circuits
A Tyagi
WASHINGTON UNIV SEATTLE NORTHWEST LAB FOR INTEGRATED SYSTEMS, 1987
471987
Efficient parallel algorithms for optical computing with the discrete Fourier transform (DFT) primitive
JH Reif, A Tyagi
Applied optics 36 (29), 7327-7340, 1997
421997
Low power FSM design using Huffman-style encoding
P Surti, LF Chao, A Tyagi
Proceedings European Design and Test Conference. ED & TC 97, 521-525, 1997
391997
Protection against indirect overflow attacks on pointers
G Zhu, A Tyagi
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
292004
Re-encoding for low power state assignment of FSMs
V Veeramachaneni, A Tyagi, S Rajgopal
Proceedings of the 1995 international symposium on Low power design, 173-178, 1995
291995
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks.
G Lee, A Tyagi
International Conference on Internet Computing, 387-394, 2000
272000
Configuration caching vs data caching for striped FPGAs
D Deshpande, AK Somani, A Tyagi
Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999
251999
GEEP: a low power genetic algorithm layout system
G Holt, A Tyagi
Proceedings of the 39th Midwest Symposium on Circuits and Systems 3, 1337-1340, 1996
231996
Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly.
J Park, A Tyagi
IEEE Consumer Electronics Magazine 6 (3), 92-102, 2017
222017
A novel charge recycling design scheme based on adiabatic charge pump
KM Keung, V Manne, A Tyagi
IEEE transactions on very large scale integration (VLSI) systems 15 (7), 733-745, 2007
212007
Characterizing composite user-device touchscreen physical unclonable functions (pufs) for mobile device authentication
RA Scheel, A Tyagi
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
192015
Energy-time trade-offs in VLSI computations
A Tyagi
International Conference on Foundations of Software Technology and …, 1989
191989
Architecture support for 3d obfuscation
M Gomathisankaran, A Tyagi
IEEE Transactions on Computers 55 (5), 497-507, 2006
172006
Energy complexity of optical computations
A Tyagi, J Reif
Proceedings of the Second IEEE Symposium on Parallel and Distributed …, 1990
171990
Software tamper resistance through dynamic program monitoring
B Blietz, A Tyagi
International Conference on Digital Rights Management, 146-163, 2005
162005
The system can't perform the operation now. Try again later.
Articles 1–20