BibTeX records: Zhen Wang 0001

download as .bib file

@article{DBLP:journals/tc/WangKB16,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Lake Bu},
  title        = {Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {8},
  pages        = {2443--2455},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2015.2485220},
  doi          = {10.1109/TC.2015.2485220},
  timestamp    = {Wed, 25 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WangKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/BuKW15,
  author       = {Lake Bu and
                  Mark G. Karpovsky and
                  Zhen Wang},
  title        = {New byte error correcting codes with simple decoding for reliable
                  cache design},
  booktitle    = {21st {IEEE} International On-Line Testing Symposium, {IOLTS} 2015,
                  Halkidiki, Greece, July 6-8, 2015},
  pages        = {200--205},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IOLTS.2015.7229859},
  doi          = {10.1109/IOLTS.2015.7229859},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/BuKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KarpovskyW14,
  author       = {Mark G. Karpovsky and
                  Zhen Wang},
  title        = {Design of Strongly Secure Communication and Computation Channels by
                  Nonlinear Error Detecting Codes},
  journal      = {{IEEE} Trans. Computers},
  volume       = {63},
  number       = {11},
  pages        = {2716--2728},
  year         = {2014},
  url          = {https://doi.org/10.1109/TC.2013.146},
  doi          = {10.1109/TC.2013.146},
  timestamp    = {Wed, 25 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/KarpovskyW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/LuoLWK14,
  author       = {Pei Luo and
                  Andy Yu{-}Lun Lin and
                  Zhen Wang and
                  Mark G. Karpovsky},
  title        = {Hardware Implementation of Secure Shamir's Secret Sharing Scheme},
  booktitle    = {15th International {IEEE} Symposium on High-Assurance Systems Engineering,
                  {HASE} 2014, Miami Beach, FL, USA, January 9-11, 2014},
  pages        = {193--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HASE.2014.34},
  doi          = {10.1109/HASE.2014.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/LuoLWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoLWK14,
  author       = {Pei Luo and
                  Andy Yu{-}Lun Lin and
                  Zhen Wang and
                  Mark G. Karpovsky},
  title        = {Hardware Implementation of Secure Shamir's Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoLWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GeWLK13,
  author       = {Shizun Ge and
                  Zhen Wang and
                  Pei Luo and
                  Mark G. Karpovsky},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Secure memories resistant to both random errors and fault injection
                  attacks using nonlinear error correction codes},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487731},
  doi          = {10.1145/2487726.2487731},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/GeWLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/WangKJ12,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Ajay Joshi},
  title        = {Secure Multipliers Resilient to Strong Fault-Injection Attacks Using
                  Multilinear Arithmetic Codes},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {20},
  number       = {6},
  pages        = {1036--1048},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVLSI.2011.2147340},
  doi          = {10.1109/TVLSI.2011.2147340},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/WangKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/WangKJ12a,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Ajay Joshi},
  title        = {Nonlinear Multi-Error Correction Codes for Reliable {MLC} nand Flash
                  Memories},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {20},
  number       = {7},
  pages        = {1221--1234},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVLSI.2011.2157183},
  doi          = {10.1109/TVLSI.2011.2157183},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/WangKJ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/WangK12,
  author       = {Zhen Wang and
                  Mark G. Karpovsky},
  title        = {Reliable and secure memories based on algebraic manipulation correction
                  codes},
  booktitle    = {18th {IEEE} International On-Line Testing Symposium, {IOLTS} 2012,
                  Sitges, Spain, June 27-29, 2012},
  pages        = {146--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IOLTS.2012.6313861},
  doi          = {10.1109/IOLTS.2012.6313861},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/WangK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AkdemirWKS12,
  author       = {Kahraman D. Akdemir and
                  Zhen Wang and
                  Mark G. Karpovsky and
                  Berk Sunar},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Design of Cryptographic Devices Resilient to Fault Injection Attacks
                  Using Nonlinear Robust Codes},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {171--199},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_11},
  doi          = {10.1007/978-3-642-29656-7\_11},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/AkdemirWKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/WangKJ11,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Ajay Joshi},
  editor       = {David Atienza and
                  Yuan Xie and
                  Jos{\'{e}} L. Ayala and
                  Ken S. Stevens},
  title        = {Influence of metallic tubes on the reliability of {CNTFET} SRAMs:
                  error mechanisms and countermeasures},
  booktitle    = {Proceedings of the 21st {ACM} Great Lakes Symposium on {VLSI} 2010,
                  Lausanne, Switzerland, May 2-6, 2011},
  pages        = {359--362},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1973009.1973082},
  doi          = {10.1145/1973009.1973082},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/WangKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/WangK11,
  author       = {Zhen Wang and
                  Mark G. Karpovsky},
  title        = {Algebraic manipulation detection codes and their applications for
                  design of secure cryptographic devices},
  booktitle    = {17th {IEEE} International On-Line Testing Symposium {(IOLTS} 2011),
                  13-15 July, 2011, Athens, Greece},
  pages        = {234--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IOLTS.2011.5994535},
  doi          = {10.1109/IOLTS.2011.5994535},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/WangK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/WangKK10,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Konrad J. Kulikowski},
  title        = {Design of Memories with Concurrent Error Detection and Correction
                  by Nonlinear {SEC-DED} Codes},
  journal      = {J. Electron. Test.},
  volume       = {26},
  number       = {5},
  pages        = {559--580},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10836-010-5168-5},
  doi          = {10.1007/S10836-010-5168-5},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/WangKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangKJ10,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Ajay Joshi},
  title        = {Reliable {MLC} {NAND} flash memories based on nonlinear t-error-correcting
                  codes},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5545014},
  doi          = {10.1109/DSN.2010.5545014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WangKJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/WangK10,
  author       = {Zhen Wang and
                  Mark G. Karpovsky},
  title        = {Robust FSMs for cryptographic devices resilient to strong fault injection
                  attacks},
  booktitle    = {16th {IEEE} International On-Line Testing Symposium {(IOLTS} 2010),
                  5-7 July, 2010, Corfu, Greece},
  pages        = {240--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IOLTS.2010.5560195},
  doi          = {10.1109/IOLTS.2010.5560195},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/WangK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangKK09,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Konrad J. Kulikowski},
  title        = {Replacing linear Hamming codes by robust nonlinear codes results in
                  a reliability improvement of memories},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {514--523},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270297},
  doi          = {10.1109/DSN.2009.5270297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WangKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/WangVWQWBB09,
  author       = {Di Wang and
                  Vyas Venkataraman and
                  Zhen Wang and
                  Wei Qin and
                  Hangsheng Wang and
                  Mrinal Bose and
                  Jayanta Bhadra},
  editor       = {Fabrizio Lombardi and
                  Sanjukta Bhanja and
                  Yehia Massoud and
                  R. Iris Bahar},
  title        = {Accelerating multi-party scheduling for transaction-level modeling},
  booktitle    = {Proceedings of the 19th {ACM} Great Lakes Symposium on {VLSI} 2009,
                  Boston Area, MA, USA, May 10-12 2009},
  pages        = {339--344},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1531542.1531619},
  doi          = {10.1145/1531542.1531619},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/WangVWQWBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangKSJ09,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Berk Sunar and
                  Ajay Joshi},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Design of Reliable and Secure Multipliers by Multilinear Arithmetic
                  Codes},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_6},
  doi          = {10.1007/978-3-642-11145-7\_6},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangKSJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/WangKS09,
  author       = {Zhen Wang and
                  Mark G. Karpovsky and
                  Berk Sunar},
  title        = {Multilinear codes for robust error detection},
  booktitle    = {15th {IEEE} International On-Line Testing Symposium {(IOLTS} 2009),
                  24-26 June 2009, Sesimbra-Lisbon, Portugal},
  pages        = {164--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IOLTS.2009.5196002},
  doi          = {10.1109/IOLTS.2009.5196002},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/WangKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KulikowskiVWT08,
  author       = {Konrad J. Kulikowski and
                  Vyas Venkataraman and
                  Zhen Wang and
                  Alexander Taubin},
  editor       = {Donatella Sciuto},
  title        = {Power Balanced Gates Insensitive to Routing Capacitance Mismatch},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany,
                  March 10-14, 2008},
  pages        = {1280--1285},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1109/DATE.2008.4484855},
  doi          = {10.1109/DATE.2008.4484855},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/KulikowskiVWT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/KulikowskiWK08,
  author       = {Konrad J. Kulikowski and
                  Zhen Wang and
                  Mark G. Karpovsky},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Comparative Analysis of Robust Fault Attack Resistant Architectures
                  for Public and Private Cryptosystems},
  booktitle    = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FDTC.2008.13},
  doi          = {10.1109/FDTC.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/KulikowskiWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KulikowskiVWTK08,
  author       = {Konrad J. Kulikowski and
                  Vyas Venkataraman and
                  Zhen Wang and
                  Alexander Taubin and
                  Mark G. Karpovsky},
  title        = {Asynchronous balanced gates tolerant to interconnect variability},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21
                  May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}},
  pages        = {3190--3193},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCAS.2008.4542136},
  doi          = {10.1109/ISCAS.2008.4542136},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KulikowskiVWTK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics