Siavash Bayat Sarmadi

Orcid: 0000-0003-3294-2505

According to our database1, Siavash Bayat Sarmadi authored at least 46 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Digital Signature Architecture Suitable for V2V Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., February, 2024

PartialHD: Toward Efficient Hyperdimensional Computing by Partial Processing.
IEEE Internet Things J., January, 2024

2023
MISC: Multi-Input Secure Two-Party Computation.
ISC Int. J. Inf. Secur., July, 2023

Fixflow: A Framework to Evaluate Fixed-point Arithmetic in Light-Weight CNN Inference.
CoRR, 2023

Comprehensive Evaluation of RSB and Spectre Vulnerability on Modern Processors.
CoRR, 2023

2022
Efficient Hardware Implementations of Legendre Symbol Suitable for MPC Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Fast Supersingular Isogeny Diffie-Hellman and Key Encapsulation Using a Customized Pipelined Montgomery Multiplier.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly.
ISC Int. J. Inf. Secur., 2022

RISC-HD: Lightweight RISC-V Processor for Efficient Hyperdimensional Computing Inference.
IEEE Internet Things J., 2022

High-Speed Post-Quantum Cryptoprocessor Based on RISC-V Architecture for IoT.
IEEE Internet Things J., 2022

2021
Hardware Architecture for Supersingular Isogeny Diffie-Hellman and Key Encapsulation Using a Fast Montgomery Multiplier.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration.
ISC Int. J. Inf. Secur., 2021

PLCDefender: Improving Remote Attestation Techniques for PLCs Using Physical Model.
IEEE Internet Things J., 2021

Lightweight Fuzzy Extractor Based on LPN for Device and Biometric Authentication in IoT.
IEEE Internet Things J., 2021

2020
Implementation of Supersingular Isogeny-Based Diffie-Hellman and Key Encapsulation Using an Efficient Scheduling.
IEEE Trans. Circuits Syst., 2020

Lightweight and Fault-Resilient Implementations of Binary Ring-LWE for IoT Devices.
IEEE Internet Things J., 2020

Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssembly.
Proceedings of the 17th International ISC Conference on Information Security and Cryptology, 2020

2019
Low-Latency Double Point Multiplication Architecture Using Differential Addition Chain Over $GF(2^m)$.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

An Efficient Low-Latency Point-Multiplication Over Curve25519.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

Toward On-chip Network Security Using Runtime Isolation Mapping.
ACM Trans. Archit. Code Optim., 2019

Post-Quantum Cryptoprocessors Optimized for Edge and Resource-Constrained Devices in IoT.
IEEE Internet Things J., 2019

A Unified Approach to Detect and Distinguish Hardware Trojans and Faults in SRAM-based FPGAs.
J. Electron. Test., 2019

High-Performance Fault Diagnosis Schemes for Efficient Hash Algorithm BLAKE.
Proceedings of the 10th IEEE Latin American Symposium on Circuits & Systems, 2019

2018
A Low-Latency and Low-Complexity Point-Multiplication in ECC.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

Lightweight Hardware Architectures for Efficient Secure Hash Functions ECHO and Fugue.
CoRR, 2018

Reliable hardware architectures for efficient secure hash functions ECHO and fugue.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
High-Throughput Low-Complexity Unified Multipliers Over GF(2<sup>m</sup>) in Dual and Triangular Bases.
IEEE Trans. Circuits Syst. I Regul. Pap., 2016

Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach.
IACR Cryptol. ePrint Arch., 2016

2015
Systolic Gaussian Normal Basis Multiplier Architectures Suitable for High-Performance Applications.
IEEE Trans. Very Large Scale Integr. Syst., 2015

On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards.
ACM Trans. Embed. Comput. Syst., 2015

High-Throughput Low-Complexity Systolic Montgomery Multiplication Over GF(2<sup>m</sup>) Based on Trinomials.
IEEE Trans. Circuits Syst. II Express Briefs, 2015

FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic.
IEEE Embed. Syst. Lett., 2015

2014
Reliable Concurrent Error Detection Architectures for Extended Euclidean-Based Division Over GF(2<sup>m</sup>).
IEEE Trans. Very Large Scale Integr. Syst., 2014

Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures.
IEEE Trans. Circuits Syst. II Express Briefs, 2014

Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014

Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems.
IEEE Embed. Syst. Lett., 2014

Random data and key generation evaluation of some commercial tokens and smart cards.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2009
Concurrent Error Detection in Finite-Field Arithmetic Operations Using Pipelined and Systolic Architectures.
IEEE Trans. Computers, 2009

2007
On Concurrent Detection of Errors in Polynomial Basis Multiplication.
IEEE Trans. Very Large Scale Integr. Syst., 2007

Detecting errors in a polynomial basis multiplier using multiple parity bits for both inputs.
Proceedings of the 25th International Conference on Computer Design, 2007

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes.
Proceedings of the IEEE International Conference on Application-Specific Systems, 2007

2005
Concurrent Error Detection of Polynomial Basis Multiplication over Extension Fields using a Multiple-bit Parity Scheme.
Proceedings of the 20th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2005), 2005

2003
A Hybrid Fault Injection Approach Based on Simulation and Emulation Co-operation.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Speedup analysis in simulation-emulation co-operation.
Proceedings of the 2002 IEEE International Conference on Field-Programmable Technology, 2002

Fast Prototyping with Co-operation of Simulation and Emulation.
Proceedings of the Field-Programmable Logic and Applications, 2002


  Loading...