Samaneh Ghandali

According to our database1, Samaneh Ghandali authored at least 14 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128.
IEEE Access, 2021

Profiled Power-Analysis Attacks by an Efficient Architectural Extension of a CNN Implementation.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

2020
Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations.
IEEE Trans. Very Large Scale Integr. Syst., 2020

2019
Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs.
CoRR, 2019

2018
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection.
J. Hardw. Syst. Secur., 2018

2017
The First Thorough Side-Channel Hardware Trojan.
IACR Cryptol. ePrint Arch., 2017

2016
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.
IACR Cryptol. ePrint Arch., 2016

2015
Automatic High-Level Data-Flow Synthesis and Optimization of Polynomial Datapaths Using Functional Decomposition.
IEEE Trans. Computers, 2015

Logic Debugging of Arithmetic Circuits.
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015

Low power scheduling in high-level synthesis using dual-Vth library.
Proceedings of the Sixteenth International Symposium on Quality Electronic Design, 2015

2014
RTL datapath optimization using system-level transformations.
Proceedings of the Fifteenth International Symposium on Quality Electronic Design, 2014

2012
Polynomial datapath synthesis and optimization based on vanishing polynomial over Z2<sup>m</sup> and algebraic techniques.
Proceedings of the Tenth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2012

2011
A secure joint wavelet based steganography and secret sharing method.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2009
Off-Line Persian Signature Identification and Verification Based on Image Registration and Fusion.
J. Multim., 2009


  Loading...