Avinash L. Varna

Orcid: 0009-0009-4189-5860

Affiliations:
  • Intel Corporation, USA


According to our database1, Avinash L. Varna authored at least 35 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%-99.99% Error Coverage in Intel 4 CMOS.
IEEE J. Solid State Circuits, January, 2024

2023
Enhanced PATRON: Fault Injection and Power-aware FSM Encoding Through Linear Programming.
ACM Trans. Design Autom. Electr. Syst., November, 2023

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference.
IACR Cryptol. ePrint Arch., 2023

A 100Gbps Fault-Injection Attack Resistant AES-256 Engine with 99.1-to-99.99% Error Coverage in Intel 4 CMOS.
Proceedings of the IEEE International Solid- State Circuits Conference, 2023

Invited: Pre-silicon Side Channel and Fault Analysis.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2021
EM and Power SCA-Resilient AES-256 Through >350× Current-Domain Signature Attenuation and Local Lower Metal Routing.
IEEE J. Solid State Circuits, 2021

Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier.
IACR Cryptol. ePrint Arch., 2021

2020
27.3 EM and Power SCA-Resilient AES-256 in 65nm CMOS Through >350× Current-Domain Signature Attenuation.
Proceedings of the 2020 IEEE International Solid- State Circuits Conference, 2020

2014
Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization.
IEEE Access, 2014

2013
"Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing.
IEEE Trans. Inf. Forensics Secur., 2013

2012
An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2012

Modeling and analysis of Electric Network Frequency signal for timestamp verification.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

A gradient descent based approach to secure localization in mobile sensor networks.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Modeling and Analysis of Correlated Binary Fingerprints for Content Identification.
IEEE Trans. Inf. Forensics Secur., 2011

"Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Modeling temporal correlations in content fingerprints.
Proceedings of the IEEE International Conference on Acoustics, 2011

Secure video processing: Problems and challenges.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
A framework for theoretical analysis of content fingerprinting.
Proceedings of the Media Forensics and Security II, 2010

Forensic hash for multimedia information.
Proceedings of the Media Forensics and Security II, 2010

Security analysis for privacy preserving search of multimedia.
Proceedings of the International Conference on Image Processing, 2010

Performance impact of ordinal ranking on content fingerprinting.
Proceedings of the International Conference on Image Processing, 2010

Gradient descent approach for secure localization in resource constrained wireless sensor networks.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Fingerprinting compressed multimedia signals.
IEEE Trans. Inf. Forensics Secur., 2009

Modeling content fingerprints using markov random fields.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Modeling and analysis of ordinal ranking in content fingerprinting.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Enabling search over encrypted multimedia databases.
Proceedings of the Media Forensics and Security I, 2009

Modeling and analysis of content identification.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Data hiding in hard-copy text documents robust to print, scan and photocopy operations.
Proceedings of the IEEE International Conference on Acoustics, 2009

Secure image retrieval through feature protection.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Generalized traitor tracing for nested codes.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

A decision theoretic framework for analyzing binary hash-based content identification systems.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Confidentiality-preserving rank-ordered search.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia.
Proceedings of the International Conference on Image Processing, 2007

Collusion-Resistant Fingerprinting for Compressed Multimedia Signals.
Proceedings of the IEEE International Conference on Acoustics, 2007


  Loading...