Xuan Thuy Ngo

According to our database1, Xuan Thuy Ngo authored at least 16 papers between 2014 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2018
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA.
J. Hardw. Syst. Secur., 2018

2017
Cryptographically Secure Shield for Security IPs Protection.
IEEE Trans. Computers, 2017

2016
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis.
J. Cryptogr. Eng., 2016

PLL to the rescue: a novel EM fault countermeasure.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Private circuits II versus fault injection attacks.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015

Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Hardware property checker for run-time Hardware Trojan detection.
Proceedings of the European Conference on Circuit Theory and Design, 2015

Optimized linear complementary codes implementation for hardware trojan prevention.
Proceedings of the European Conference on Circuit Theory and Design, 2015

Integrated Sensor: A Backdoor for Hardware Trojan Insertions?
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

Hardware trojan detection by delay and electromagnetic measurements.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon.
IEEE Trans. Emerg. Top. Comput., 2014

Hardware Trojan Horses in Cryptographic IP Cores.
IACR Cryptol. ePrint Arch., 2014

Cryptographically secure shields.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses.
Proceedings of the 9th Workshop on Embedded Systems Security, 2014


  Loading...