Остановите войну!
for scientists:
default search action
Zhen Wang 0001
- > Home > Persons > Zhen Wang 0001
Publications
- 2016
- [j5]Zhen Wang, Mark G. Karpovsky, Lake Bu:
Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing. IEEE Trans. Computers 65(8): 2443-2455 (2016) - 2015
- [c15]Lake Bu, Mark G. Karpovsky, Zhen Wang:
New byte error correcting codes with simple decoding for reliable cache design. IOLTS 2015: 200-205 - 2014
- [j4]Mark G. Karpovsky, Zhen Wang:
Design of Strongly Secure Communication and Computation Channels by Nonlinear Error Detecting Codes. IEEE Trans. Computers 63(11): 2716-2728 (2014) - [c14]Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. HASE 2014: 193-200 - [i1]Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2014: 887 (2014) - 2013
- [c13]Shizun Ge, Zhen Wang, Pei Luo, Mark G. Karpovsky:
Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. HASP@ISCA 2013: 5 - 2012
- [j3]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Secure Multipliers Resilient to Strong Fault-Injection Attacks Using Multilinear Arithmetic Codes. IEEE Trans. Very Large Scale Integr. Syst. 20(6): 1036-1048 (2012) - [j2]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Nonlinear Multi-Error Correction Codes for Reliable MLC nand Flash Memories. IEEE Trans. Very Large Scale Integr. Syst. 20(7): 1221-1234 (2012) - [c12]Zhen Wang, Mark G. Karpovsky:
Reliable and secure memories based on algebraic manipulation correction codes. IOLTS 2012: 146-149 - [p1]Kahraman D. Akdemir, Zhen Wang, Mark G. Karpovsky, Berk Sunar:
Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes. Fault Analysis in Cryptography 2012: 171-199 - 2011
- [c11]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Influence of metallic tubes on the reliability of CNTFET SRAMs: error mechanisms and countermeasures. ACM Great Lakes Symposium on VLSI 2011: 359-362 - [c10]Zhen Wang, Mark G. Karpovsky:
Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. IOLTS 2011: 234-239 - 2010
- [j1]Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski:
Design of Memories with Concurrent Error Detection and Correction by Nonlinear SEC-DED Codes. J. Electron. Test. 26(5): 559-580 (2010) - [c9]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. DSN 2010: 41-50 - [c8]Zhen Wang, Mark G. Karpovsky:
Robust FSMs for cryptographic devices resilient to strong fault injection attacks. IOLTS 2010: 240-245 - 2009
- [c7]Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski:
Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. DSN 2009: 514-523 - [c6]Di Wang, Vyas Venkataraman, Zhen Wang, Wei Qin, Hangsheng Wang, Mrinal Bose, Jayanta Bhadra:
Accelerating multi-party scheduling for transaction-level modeling. ACM Great Lakes Symposium on VLSI 2009: 339-344 - [c5]Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Joshi:
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. ICICS 2009: 47-62 - [c4]Zhen Wang, Mark G. Karpovsky, Berk Sunar:
Multilinear codes for robust error detection. IOLTS 2009: 164-169 - 2008
- [c3]Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang, Alexander Taubin:
Power Balanced Gates Insensitive to Routing Capacitance Mismatch. DATE 2008: 1280-1285 - [c2]Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky:
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems. FDTC 2008: 41-50 - [c1]Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang, Alexander Taubin, Mark G. Karpovsky:
Asynchronous balanced gates tolerant to interconnect variability. ISCAS 2008: 3190-3193
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint