NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 29
1.
  • Area efficient camouflaging... Area efficient camouflaging technique for securing IC reverse engineering
    Ali, Md Liakot; Hossain, Md Ismail; Hossain, Fakir Sharif PloS one, 11/2021, Letnik: 16, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Reverse engineering is a burning issue in Integrated Circuit (IC) design and manufacturing. In the semiconductor industry, it results in a revenue loss of billions of dollars every year. In this ...
Celotno besedilo

PDF
2.
  • A dual mode self-test for a... A dual mode self-test for a stand alone AES core
    Hossain, Fakir Sharif; Sakib, Taiyeb Hasan; Ashar, Muhammad ... PloS one, 12/2021, Letnik: 16, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric ...
Celotno besedilo

PDF
3.
  • Design of a BIST implemente... Design of a BIST implemented AES crypto-processor ASIC
    Ali, Md Liakot; Rahman, Md Shazzatur; Hossain, Fakir Sharif PloS one, 11/2021, Letnik: 16, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC). AES has been proved as the ...
Celotno besedilo

PDF
4.
  • Advancements in scalability... Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology
    Mahmud, Minhaz; Sohan, Md. Soharab Hossain; Reno, Saha ... The Journal of supercomputing, 04/2024, Letnik: 80, Številka: 6
    Journal Article
    Recenzirano

    Blockchain technology has gained widespread popularity due to its robust security features, making it an attractive solution for various applications such as cryptocurrency, healthcare, supply chain ...
Celotno besedilo
5.
  • An Effective and Sensitive ... An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan
    HOSSAIN, Fakir Sharif; YONEDA, Tomokazu; INOUE, Michiko IEICE Transactions on Information and Systems, 2017/01/01, 2017-00-00, 20170101, Letnik: E100.D, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Due to outsourcing of numerous stages of the IC manufacturing process to different foundries, the security risk, such as hardware Trojan becomes a potential threat. In this paper, we present a layout ...
Celotno besedilo

PDF
6.
  • A Novel Byte-Substitution A... A Novel Byte-Substitution Architecture for the AES Cryptosystem
    Hossain, Fakir Sharif; Ali, Md Liakot PloS one, 10/2015, Letnik: 10, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The performance of Advanced Encryption Standard (AES) mainly depends on speed, area and power. The S-box represents an important factor that affects the performance of AES on each of these factors. A ...
Celotno besedilo

PDF
7.
  • The effectiveness of virtua... The effectiveness of virtual reality cycling exercise towards the motoric and cardiorespiratory functions of post-stroke patients
    Lesmana, I Putu Dody; Destarianto, Prawidya; Widiawan, Beni ... Physiotherapy Quarterly, 5/2023, Letnik: 32, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Introduction Virtual reality (VR) cycling exercise was developed as a physical rehabilitation therapy to impair the deficit on motoric function and cardiorespiratory fitness on post-stroke patients ...
Celotno besedilo
8.
Celotno besedilo
9.
Celotno besedilo
10.
  • Glitch Variability Aware Power Side-Channel for Detecting Hardware Trojans
    Ahmed, Ibrahim Farah; Hossain, Fakir Sharif 2024 International Conference on Advances in Computing, Communication, Electrical, and Smart Systems (iCACCESS), 2024-March-8
    Conference Proceeding

    Addressing the challenge of high detection sensitivity in the presence of process variation is crucial for hardware Trojan detection through post-silicon side-channel analysis. In this work, we ...
Celotno besedilo
1 2 3
zadetkov: 29

Nalaganje filtrov