Folgen
Chenglu Jin
Titel
Zitiert von
Zitiert von
Jahr
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M van Dijk
IACR Cryptology ePrint Archive 2018 (350), 2018
1772018
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5, 153-169, 2015
892015
Advancing the state-of-the-art in hardware trojans detection
SK Haider, C Jin, M Ahmad, DM Shila, O Khan, M van Dijk
IEEE Transactions on Dependable and Secure Computing 16 (1), 18-32, 2017
88*2017
A survey of cybersecurity of digital manufacturing
P Mahesh, A Tiwari, C Jin, PR Kumar, ALN Reddy, STS Bukkapatanam, ...
Proceedings of the IEEE 109 (4), 495-516, 2020
592020
Security of cloud FPGAs: A survey
C Jin, V Gohil, R Karri, J Rajendran
arXiv preprint arXiv:2005.04867, 2020
48*2020
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk
Cryptography 1 (3), 23, 2017
362017
Phase calibrated ring oscillator PUF design and implementation on FPGAs
W Yan, C Jin, F Tehranipoor, JA Chandy
2017 27th International Conference on Field Programmable Logic and …, 2017
362017
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems
C Jin, S Valizadeh, M van Dijk
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 824-829, 2018
29*2018
Advancing the state-of-the-art in hardware trojans design
SK Haider, C Jin, M van Dijk
2017 IEEE 60th International Midwest Symposium on Circuits and Systems …, 2017
262017
Phase change memory and its applications in hardware security
RS Khan, N Noor, C Jin, J Scoggin, Z Woods, S Muneer, A Ciardullo, ...
Security Opportunities in Nano Devices and Emerging Technologies, 93-114, 2017
23*2017
Secure and efficient initialization and authentication protocols for SHIELD
C Jin, M van Dijk
IEEE Transactions on Dependable and Secure Computing 16 (1), 156-173, 2017
192017
Efficient erasable PUFs from programmable logic and memristors
Y Gao, C Jin, J Kim, H Nili, X Xu, W Burleson, O Kavehei, M van Dijk, ...
Cryptology ePrint Archive, 2018
172018
Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems
Z Yang, C Jin, Y Tian, J Lai, J Zhou
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
122020
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
122014
PLCrypto: A symmetric cryptographic library for programmable logic controllers
Z Yang, Z Bao, C Jin, Z Liu, J Zhou
IACR Transactions on Symmetric Cryptology, 170-217, 2021
112021
Erasable pufs: Formal treatment and generic design
C Jin, W Burleson, M van Dijk, U Rührmair
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020
11*2020
Programmable access-controlled and generic erasable PUF design and its applications
C Jin, W Burleson, M van Dijk, U Rührmair
Journal of Cryptographic Engineering 12 (4), 413-432, 2022
102022
Proof of aliveness
C Jin, Z Yang, M van Dijk, J Zhou
Proceedings of the 35th Annual Computer Security Applications Conference, 1-16, 2019
102019
New clone-detection approach for RFID-based supply chains
H Maleki, R Rahaeimehr, C Jin, M Van Dijk
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
102017
HMACCE: establishing authenticated and confidential channel from historical data for industrial internet of things
C Jin, Z Yang, T Xiang, S Adepu, J Zhou
IEEE Transactions on Information Forensics and Security 18, 1080-1094, 2023
9*2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20