Search Results - "Bu, Lake"

Refine Results
  1. 1

    Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing by Zhen Wang, Karpovsky, Mark, Bu, Lake

    Published in IEEE transactions on computers (01-08-2016)
    “…Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. The security of the unprotected sharing scheme, however,…”
    Get full text
    Journal Article
  2. 2

    Crosstalk Free Coding Systems to Protect NoC Channels against Crosstalk Faults by Soleimani, Kimia, Patooghy, Ahmad, Soltani, Nasim, Lake Bu, Kinsy, Michel A.

    “…Reliability of modern multicore and many-core chips is tightly coupled with the reliability of their on-chip networks. Communication channels in current…”
    Get full text
    Conference Proceeding
  3. 3

    Designing Secure Heterogeneous Multicore Systems from Untrusted Components by Kinsy, Michel, Bu, Lake, Isakov, Mihailo, Mark, Miguel

    Published in Cryptography (01-09-2018)
    “…In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code…”
    Get full text
    Journal Article
  4. 4

    A secure and robust scheme for sharing confidential information in IoT systems by Bu, Lake, Isakov, Mihailo, Kinsy, Michel A.

    Published in Ad hoc networks (01-09-2019)
    “…In Internet of Things (IoT) systems with security demands, there is often a need to distribute sensitive information (such as encryption keys, digital…”
    Get full text
    Journal Article
  5. 5

    A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems by Bu, Lake, Isakov, Mihailo, Kinsy, Michel A

    Published 27-11-2019
    “…Ad Hoc Networks, vol. 92, 2019 - Special Issue on Security of IoT-enabled Infrastructures in Smart Cities In Internet of Things (IoT) systems with security…”
    Get full text
    Journal Article
  6. 6

    A hybrid self-diagnosis mechanism with defective nodes locating and attack detection for parallel computing systems by Lake Bu, Karpovsky, Mark

    “…In recent years parallel computing has been widely employed for both science research and commercial applications. For parallel systems such as many-core or…”
    Get full text
    Conference Proceeding
  7. 7

    New byte error correcting codes with simple decoding for reliable cache design by Lake Bu, Karpovsky, Mark, Wang, Zhen

    “…Most cache designs support single or double bit-level error detection and correction in cache lines. However, a single error may distort a whole byte or even…”
    Get full text
    Conference Proceeding
  8. 8

    Bulwark: Securing implantable medical devices communication channels by Bu, Lake, Karpovsky, Mark G., Kinsy, Michel A.

    Published in Computers & security (01-09-2019)
    “…•This work introduces a design of secure wireless transmission channel for implantable medical devices (IMDs).•The proposed technique is able to protect the…”
    Get full text
    Journal Article
  9. 9

    RASSS: a hijack‐resistant confidential information management scheme for distributed systems by Bu, Lake, Isakov, Mihailo, Kinsy, Michel A

    “…In distributed systems there is often a need to store and share sensitive information (e.g., encryption keys, digital signatures, login credentials etc.) among…”
    Get full text
    Journal Article
  10. 10

    Design of Secure and Trustworthy System-on-chip Architectures Using Hardware-based Root-of-trust Techniques by Bu, Lake

    Published 01-01-2019
    “…Cyber-security is now a critical concern in a wide range of embedded computing modules, communications systems, and connected devices. These devices are used…”
    Get full text
    Dissertation
  11. 11

    Quantum-Proof Lightweight McEliece Cryptosystem Co-processor Design by Agrawal, Rashmi, Bu, Lake, Kinsy, Michel A.

    “…Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction…”
    Get full text
    Conference Proceeding
  12. 12

    Adaptive and Dynamic Device Authentication Using Lorenz Chaotic Systems by Bu, Lake, Cheng, Hai, Kinsy, Michel A.

    “…Chaotic systems such as Lorenz functions have been proposed as cryptographic primitives due to their short-range divergence attributes. They are commonly used…”
    Get full text
    Conference Proceeding
  13. 13

    Design of reliable storage and compute systems with lightweight group testing based non‐binary error correction codes by Bu, Lake, Karpovsky, Mark G, Kinsy, Michel A

    “…In this study, the authors propose a new group testing based (GTB) error control codes (ECCs) approach for improving the reliability of memory structures in…”
    Get full text
    Journal Article
  14. 14

    Fast Dynamic Device Authentication Based on Lorenz Chaotic Systems by Bu, Lake, Cheng, Hai, Kinsy, Michel A.

    “…Chaotic systems, such as Lorenz systems or logistic functions, are known for their rapid divergence property. Even the smallest change in the initial condition…”
    Get full text
    Conference Proceeding
  15. 15

    Design-flow Methodology for Secure Group Anonymous Authentication by Agrawal, Rashmi, Bu, Lake, Rosario, Eliakin Del, Kinsy, Michel A.

    “…In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and…”
    Get full text
    Conference Proceeding
  16. 16

    RASSS: A perfidy-aware protocol for designing trustworthy distributed systems by Bu, Lake, Nguyen, Hien D., Kinsy, Michel A.

    “…Robust Adaptive Secure Secret Sharing (RASSS) is a protocol for reconstructing secrets and information in distributed computing systems even in the presence of…”
    Get full text
    Conference Proceeding
  17. 17

    SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems by Bu, Lake, Dofe, Jaya, Yu, Qiaoyan, Kinsy, Michel A.

    Published in Journal of hardware and systems security (01-09-2019)
    “…Although there is a pressing need for highly secure and reliable computing systems, there is a glaring lack of formalism under which the properties of…”
    Get full text
    Journal Article
  18. 18

    A Post-Quantum Secure Discrete Gaussian Noise Sampler by Agrawal, Rashmi, Bu, Lake, Kinsy, Michel A.

    “…While the notion of achieving "quantum supremacy" may be debatable, rapid developments in the field of quantum computing are heading towards more realistic…”
    Get full text
    Conference Proceeding
  19. 19

    Open-Source FPGA Implementation of Post-Quantum Cryptographic Hardware Primitives by Agrawal, Rashmi, Bu, Lake, Ehret, Alan, Kinsy, Michel

    “…The following topics are dealt with: field programmable gate arrays; learning (artificial intelligence); convolutional neural nets; logic design;…”
    Get full text
    Conference Proceeding
  20. 20

    Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators by Isakov, Mihailo, Bu, Lake, Cheng, Hai, Kinsy, Michel A.

    “…Machine learning (ML) models are often trained using private datasets that are very expensive to collect, or highly sensitive, using large amounts of computing…”
    Get full text
    Conference Proceeding