default search action
Avinash L. Varna
Person information
- affiliation: Intel Corporation, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Raghavan Kumar, Avinash L. Varna, Carlos Tokunaga, Sachin Taneja, Vivek De, Sanu K. Mathew:
A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%-99.99% Error Coverage in Intel 4 CMOS. IEEE J. Solid State Circuits 59(1): 79-89 (2024) - [c27]Shota Konno, Zachary J. Ellis, Anupam Golder, Sigang Ryu, Daniel Dinu, Avinash Varna, Sanu Mathew, Arijit Raychowdhury:
A 65nm Delta-Sigma ADC Based VDD-Variation-Tolerant Power-Side-Channel-Attack Monitor with Detection Capability Down to 0.25Ω. VLSI Technology and Circuits 2024: 1-2 - 2023
- [j7]Muhtadi Choudhury, Minyan Gao, Avinash Varna, Elad Peer, Domenic Forte:
Enhanced PATRON: Fault Injection and Power-aware FSM Encoding Through Linear Programming. ACM Trans. Design Autom. Electr. Syst. 28(6): 93:1-93:26 (2023) - [c26]Anupam Golder, Debayan Das, Santosh Ghosh, Avinash Varna, Majid Sabbagh, Sayak Ray, Rana Elnaggar, Joseph Friel, Daniel Dinu, Jason M. Fung:
Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK. DAC 2023: 1-6 - [c25]Jasper Van Woudenberg, Peter Grossmann, Avinash Varna, Joseph Friel, Daniel Dinu, Ronnie Lindsay, Steve J. Brown:
Invited: Pre-silicon Side Channel and Fault Analysis. DAC 2023: 1-4 - [c24]Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. HOST 2023: 155-166 - [c23]Raghavan Kumar, Avinash Varna, Carlos Tokunaga, Sachin Taneja, Vivek De, Sanu Mathew:
A 100Gbps Fault-Injection Attack Resistant AES-256 Engine with 99.1-to-99.99% Error Coverage in Intel 4 CMOS. ISSCC 2023: 244-245 - [i2]Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. IACR Cryptol. ePrint Arch. 2023: 163 (2023) - 2021
- [j6]Debayan Das, Josef Danial, Anupam Golder, Nirmoy Modak, Shovan Maity, Baibhab Chatterjee, Dong-Hyun Seo, Muya Chang, Avinash Varna, Harish K. Krishnamurthy, Sanu Mathew, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen:
EM and Power SCA-Resilient AES-256 Through >350× Current-Domain Signature Attenuation and Local Lower Metal Routing. IEEE J. Solid State Circuits 56(1): 136-150 (2021) - [i1]Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj R. Sastry, Santosh Ghosh:
Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier. IACR Cryptol. ePrint Arch. 2021: 1697 (2021) - 2020
- [c22]Debayan Das, Josef Danial, Anupam Golder, Nirmoy Modak, Shovan Maity, Baibhab Chatterjee, Dong-Hyun Seo, Muya Chang, Avinash Varna, Harish Krishnamurthy, Sanu Mathew, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen:
27.3 EM and Power SCA-Resilient AES-256 in 65nm CMOS Through >350× Current-Domain Signature Attenuation. ISSCC 2020: 424-426
2010 – 2019
- 2014
- [j5]Wenjun Lu, Avinash L. Varna, Min Wu:
Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization. IEEE Access 2: 125-141 (2014) - 2013
- [j4]Ravi Garg, Avinash L. Varna, Adi Hajj-Ahmad, Min Wu:
"Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing. IEEE Trans. Inf. Forensics Secur. 8(9): 1417-1432 (2013) - 2012
- [j3]Ravi Garg, Avinash L. Varna, Min Wu:
An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 7(2): 717-730 (2012) - [c21]Ravi Garg, Avinash L. Varna, Min Wu:
A gradient descent based approach to secure localization in mobile sensor networks. ICASSP 2012: 1869-1872 - [c20]Ravi Garg, Avinash L. Varna, Min Wu:
Modeling and analysis of Electric Network Frequency signal for timestamp verification. WIFS 2012: 67-72 - 2011
- [j2]Avinash L. Varna, Min Wu:
Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1146-1159 (2011) - [c19]Avinash L. Varna, Min Wu:
Modeling temporal correlations in content fingerprints. ICASSP 2011: 1860-1863 - [c18]Wenjun Lu, Avinash L. Varna, Min Wu:
Secure video processing: Problems and challenges. ICASSP 2011: 5856-5859 - [c17]Ravi Garg, Avinash L. Varna, Min Wu:
"Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. ACM Multimedia 2011: 23-32 - 2010
- [c16]Ravi Garg, Avinash L. Varna, Min Wu:
Gradient descent approach for secure localization in resource constrained wireless sensor networks. ICASSP 2010: 1854-1857 - [c15]Wenjun Lu, Avinash L. Varna, Min Wu:
Security analysis for privacy preserving search of multimedia. ICIP 2010: 2093-2096 - [c14]Wei-Hong Chuang, Avinash L. Varna, Min Wu:
Performance impact of ordinal ranking on content fingerprinting. ICIP 2010: 2369-2372 - [c13]Wenjun Lu, Avinash L. Varna, Min Wu:
Forensic hash for multimedia information. Media Forensics and Security 2010: 75410Y - [c12]Avinash L. Varna, Wei-Hong Chuang, Min Wu:
A framework for theoretical analysis of content fingerprinting. Media Forensics and Security 2010: 754112
2000 – 2009
- 2009
- [j1]Avinash L. Varna, Shan He, Ashwin Swaminathan, Min Wu:
Fingerprinting compressed multimedia signals. IEEE Trans. Inf. Forensics Secur. 4(3): 330-345 (2009) - [c11]Avinash L. Varna, Shantanu Rane, Anthony Vetro:
Data hiding in hard-copy text documents robust to print, scan and photocopy operations. ICASSP 2009: 1397-1400 - [c10]Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, Min Wu:
Secure image retrieval through feature protection. ICASSP 2009: 1533-1536 - [c9]Avinash L. Varna, Min Wu:
Modeling and analysis of content identification. ICME 2009: 1528-1531 - [c8]Wenjun Lu, Ashwin Swaminathan, Avinash L. Varna, Min Wu:
Enabling search over encrypted multimedia databases. Media Forensics and Security 2009: 725418 - [c7]Avinash L. Varna, Min Wu:
Modeling content fingerprints using markov random fields. WIFS 2009: 111-115 - [c6]Wei-Hong Chuang, Avinash L. Varna, Min Wu:
Modeling and analysis of ordinal ranking in content fingerprinting. WIFS 2009: 116-120 - 2008
- [c5]Avinash L. Varna, Ashwin Swaminathan, Min Wu:
A decision theoretic framework for analyzing binary hash-based content identification systems. Digital Rights Management Workshop 2008: 67-76 - [c4]Avinash L. Varna, Hongxia Jin:
Generalized traitor tracing for nested codes. ICME 2008: 561-564 - 2007
- [c3]Avinash L. Varna, Shan He, Ashwin Swaminathan, Min Wu, Haiming Lu, Zengxiang Lu:
Collusion-Resistant Fingerprinting for Compressed Multimedia Signals. ICASSP (2) 2007: 165-168 - [c2]Avinash L. Varna, Shan He, Ashwin Swaminathan, Min Wu:
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. ICIP (2) 2007: 133-136 - [c1]Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He, Min Wu, Douglas W. Oard:
Confidentiality-preserving rank-ordered search. StorageSS 2007: 7-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint