Search Results - "Aysu, Aydin"

Refine Results
  1. 1

    An Extensive Study of Flexible Design Methods for the Number Theoretic Transform by Mert, Ahmet Can, Karabulut, Emre, Ozturk, Erdinc, Savas, Erkay, Aysu, Aydin

    Published in IEEE transactions on computers (01-11-2022)
    “…Efficient lattice-based cryptosystems operate with polynomial rings with the Number Theoretic Transform (NTT) to reduce the computational complexity of…”
    Get full text
    Journal Article
  2. 2

    Efficient,Flexible,and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography by Karabulut, Emre, Alkim, Erdem, Aysu, Aydin

    Published in IEEE transactions on computers (25-08-2021)
    “…This paper proposes a discrete Gaussian sampling hardware design that can flexibly support different sampling parameters,that is more efficient (in area-delay…”
    Get full text
    Journal Article
  3. 3

    High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems by Ozcan, Erdem, Aysu, Aydin

    Published in IEEE embedded systems letters (01-12-2020)
    “…Compared to traditional hardware development methodologies, high-level synthesis (HLS) offers a faster time-to-market and lower design-cost at the expense of…”
    Get full text
    Journal Article
  4. 4

    A Full-Stack Approach for Side-Channel Secure ML Hardware by Dubey, Anuj, Aysu, Aydin

    “…Machine learning (ML) has recently emerged as an application with confidentiality needs. A trained ML model is indeed a high-value intellectual property (IP),…”
    Get full text
    Conference Proceeding
  5. 5

    SeqL+: Secure Scan-Obfuscation With Theoretical and Empirical Validation by Potluri, Seetal, Kundu, Shamik, Kumar, Akash, Basu, Kanad, Aysu, Aydin

    “…Scan-obfuscation is a powerful methodology to protect Silicon-based intellectual property from theft. Prior work on scan-obfuscation in the context of…”
    Get full text
    Journal Article
  6. 6

    2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning by Kashyap, Priyank, Aydin, Furkan, Potluri, Seetal, Franzon, Paul D., Aysu, Aydin

    “…Advancements in quantum computing present a security threat to classical cryptography algorithms. Lattice-based key exchange protocols show strong promise due…”
    Get full text
    Journal Article
  7. 7

    Leaking secrets in homomorphic encryption with side-channel attacks by Aydin, Furkan, Aysu, Aydin

    “…Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain without knowing the encryption key. It is possible, however, to break…”
    Get full text
    Journal Article
  8. 8

    Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms by Aysu, Aydin, Schaumont, Patrick

    Published in IEEE transactions on computers (01-09-2016)
    “…Energy-harvesting techniques can be combined with wireless embedded sensors to obtain battery-free platforms with an extended lifetime. Although…”
    Get full text
    Journal Article
  9. 9

    Masking FALCON’s Floating-Point Multiplication in Hardware by Karabulut, Emre, Aysu, Aydin

    “…Floating-point arithmetic is a cornerstone in a wide array of computational domains, and it recently became a building block for the FALCON post-quantum…”
    Get full text
    Journal Article
  10. 10

    SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs by Karabulut, Emre, Awad, Amro, Aysu, Aydin

    “…FPGAs are newly added to the cloud to offer energy-efficient acceleration. Multi-tenancy is an emerging phenomenon in cloud FPGAs to enable resource…”
    Get full text
    Conference Proceeding
  11. 11

    ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking by Dubey, Anuj, Ahmad, Afzal, Pasha, Muhammad Adeel, Cammarota, Rosario, Aysu, Aydin

    “…Intellectual Property (IP) thefts of trained machine learning (ML) models through side-channel attacks on inference engines are becoming a major threat…”
    Get full text
    Journal Article
  12. 12

    A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature by Karabulut, Emre, Aysu, Aydin

    “…Sampling random values from a discrete Gaussian distribution with high precision is a major and computationally-intensive operation of emerging and existing…”
    Get full text
    Conference Proceeding
  13. 13

    MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection by Dubey, Anuj, Cammarota, Rosario, Aysu, Aydin

    “…Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from…”
    Get full text
    Conference Proceeding
  14. 14

    FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks by Karabulut, Emre, Aysu, Aydin

    “…This paper proposes the first side-channel attack on FALCON-a NIST Round-3 finalist for the post-quantum digital signature standard. We demonstrate a…”
    Get full text
    Conference Proceeding
  15. 15

    Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware by Potluri, Seetal, Aysu, Aydin

    “…Stealing trained machine learning (ML) models is a new and growing concern due to the model's development cost. Existing work on ML model extraction either…”
    Get full text
    Conference Proceeding
  16. 16

    A new maskless debiasing method for lightweight physical unclonable functions by Aydin Aysu, Ye Wang, Schaumont, Patrick, Orshansky, Michael

    “…An ideal Physical Unclonable Function produces a string of static random bits. Noise causes these bits to be unstable over subsequent readings and biases cause…”
    Get full text
    Conference Proceeding
  17. 17

    BoMaNet: Boolean Masking of an Entire Neural Network by Dubey, Anuj, Cammarota, Rosario, Aysu, Aydin

    “…Recent work on stealing machine learning (ML) models from inference engines with physical side-channel attacks warrant an urgent need for effective…”
    Get full text
    Conference Proceeding
  18. 18

    Hardware/software co-design of physical unclonable function based authentications on FPGAs by Aysu, Aydin, Schaumont, Patrick

    Published in Microprocessors and microsystems (01-10-2015)
    “…Physical Unclonable Functions (PUFs) enable the generation of device-unique, on-chip, and digital identifiers by exploiting the manufacturing process…”
    Get full text
    Journal Article
  19. 19

    Binary Ring-LWE hardware with power side-channel countermeasures by Aysu, Aydin, Orshansky, Michael, Tiwari, Mohit

    “…We describe the first hardware implementation of a quantum-secure encryption scheme along with its low-cost power side-channel countermeasures. The encryption…”
    Get full text
    Conference Proceeding
  20. 20

    SIMON Says: Break Area Records of Block Ciphers on FPGAs by Aysu, Aydin, Gulcan, Ege, Schaumont, Patrick

    Published in IEEE embedded systems letters (01-06-2014)
    “…While advanced encryption standard (AES) is extensively in use in a number of applications, its area cost limits its deployment in resource constrained…”
    Get full text
    Journal Article