Search dblp for Publications

export results for "Leonid Azriel"

 download as .bib file

@article{DBLP:journals/tches/BelenkyDTBKAK23,
  author       = {Yaacov Belenky and
                  Ira Dushar and
                  Valery Teper and
                  Vadim Bugaenko and
                  Oleg Karavaev and
                  Leonid Azriel and
                  Yury Kreimer},
  title        = {Carry-based Differential Power Analysis {(CDPA)} and its Application
                  to Attacking {HMAC-SHA-2}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {1--29},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.1-29},
  doi          = {10.46586/TCHES.V2023.I3.1-29},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelenkyDTBKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/ZakenMARM23,
  author       = {Segev Zaken and
                  Keshet Meir and
                  Leonid Azriel and
                  Tomer Rindenau and
                  Avi Mendelson},
  title        = {Exploring the Limitations of the Property-based Hardware-Trojan Detection
                  Methods},
  booktitle    = {{IEEE} International Conference on Omni-layer Intelligent Systems,
                  {COINS} 2023, Berlin, Germany, July 23-25, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COINS57856.2023.10189294},
  doi          = {10.1109/COINS57856.2023.10189294},
  timestamp    = {Fri, 04 Aug 2023 13:58:10 +0200},
  biburl       = {https://dblp.org/rec/conf/coins/ZakenMARM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzrielM23,
  author       = {Leonid Azriel and
                  Avi Mendelson},
  title        = {Towards Open Scan for the Open-source Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1178},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzrielM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelenkyBACDKMRT22,
  author       = {Yaacov Belenky and
                  Vadim Bugaenko and
                  Leonid Azriel and
                  Hennadii Chernyshchyk and
                  Ira Dushar and
                  Oleg Karavaev and
                  Oleh Maksimenko and
                  Yulia Ruda and
                  Valery Teper and
                  Yury Kreimer},
  title        = {Redundancy {AES} Masking Basis for Attack Mitigation {(RAMBAM)}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {69--91},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.69-91},
  doi          = {10.46586/TCHES.V2022.I2.69-91},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelenkyBACDKMRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AzrielSAGMP21,
  author       = {Leonid Azriel and
                  Julian Speith and
                  Nils Albartus and
                  Ran Ginosar and
                  Avi Mendelson and
                  Christof Paar},
  title        = {A survey of algorithmic methods in {IC} reverse engineering},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {299--315},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00268-5},
  doi          = {10.1007/S13389-021-00268-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AzrielSAGMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BelenkyDTCAK21,
  author       = {Yaacov Belenky and
                  Ira Dushar and
                  Valery Teper and
                  Hennadii Chernyshchyk and
                  Leonid Azriel and
                  Yury Kreimer},
  editor       = {Shivam Bhasin and
                  Fabrizio De Santis},
  title        = {First Full-Fledged Side Channel Attack on {HMAC-SHA-2}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 12th International
                  Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12910},
  pages        = {31--52},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89915-8\_2},
  doi          = {10.1007/978-3-030-89915-8\_2},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/BelenkyDTCAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzrielSAGMP21,
  author       = {Leonid Azriel and
                  Julian Speith and
                  Nils Albartus and
                  Ran Ginosar and
                  Avi Mendelson and
                  Christof Paar},
  title        = {A survey of algorithmic methods in {IC} reverse engineering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1278},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1278},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzrielSAGMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbartusHTAP20,
  author       = {Nils Albartus and
                  Max Hoffmann and
                  Sebastian Temme and
                  Leonid Azriel and
                  Christof Paar},
  title        = {{DANA} Universal Dataflow Analysis for Gate-Level Netlist Reverse
                  Engineering},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {309--336},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.309-336},
  doi          = {10.13154/TCHES.V2020.I4.309-336},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlbartusHTAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbartusHTAP20,
  author       = {Nils Albartus and
                  Max Hoffmann and
                  Sebastian Temme and
                  Leonid Azriel and
                  Christof Paar},
  title        = {{DANA} - Universal Dataflow Analysis for Gate-Level Netlist Reverse
                  Engineering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/751},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbartusHTAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taco/AzrielHARHMRWFM19,
  author       = {Leonid Azriel and
                  Lukas Humbel and
                  Reto Achermann and
                  Alex Richardson and
                  Moritz Hoffmann and
                  Avi Mendelson and
                  Timothy Roscoe and
                  Robert N. M. Watson and
                  Paolo Faraboschi and
                  Dejan S. Milojicic},
  title        = {Memory-Side Protection With a Capability Enforcement Co-Processor},
  journal      = {{ACM} Trans. Archit. Code Optim.},
  volume       = {16},
  number       = {1},
  pages        = {5:1--5:26},
  year         = {2019},
  url          = {https://doi.org/10.1145/3302257},
  doi          = {10.1145/3302257},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taco/AzrielHARHMRWFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AzrielGM19,
  author       = {Leonid Azriel and
                  Ran Ginosar and
                  Avi Mendelson},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Patrick Schaumont},
  title        = {SoK: An Overview of Algorithmic Methods in {IC} Reverse Engineering},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Attacks and Solutions in
                  Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15,
                  2019},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338508.3359575},
  doi          = {10.1145/3338508.3359575},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AzrielGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/AzrielGGM17,
  author       = {Leonid Azriel and
                  Ran Ginosar and
                  Shay Gueron and
                  Avi Mendelson},
  title        = {Using Scan Side Channel to Detect {IP} Theft},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {25},
  number       = {12},
  pages        = {3268--3280},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVLSI.2017.2715188},
  doi          = {10.1109/TVLSI.2017.2715188},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/AzrielGGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AzrielGM17,
  author       = {Leonid Azriel and
                  Ran Ginosar and
                  Avi Mendelson},
  editor       = {Laleh Behjat and
                  Jie Han and
                  Miroslav N. Velev and
                  Deming Chen},
  title        = {Revealing On-chip Proprietary Security Functions with Scan Side Channel
                  Based Reverse Engineering},
  booktitle    = {Proceedings of the on Great Lakes Symposium on {VLSI} 2017, Banff,
                  AB, Canada, May 10-12, 2017},
  pages        = {233--238},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3060403.3060464},
  doi          = {10.1145/3060403.3060464},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AzrielGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/AzrielK17,
  author       = {Leonid Azriel and
                  Shahar Kvatinsky},
  title        = {Towards a memristive hardware secure hash function (MemHash)},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {51--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951797},
  doi          = {10.1109/HST.2017.7951797},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/AzrielK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AzrielGGM16,
  author       = {Leonid Azriel and
                  Ran Ginosar and
                  Shay Gueron and
                  Avi Mendelson},
  title        = {Using Scan Side Channel for Detecting {IP} Theft},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948619},
  doi          = {10.1145/2948618.2948619},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AzrielGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/AzrielMW15,
  author       = {Leonid Azriel and
                  Avi Mendelson and
                  Uri C. Weiser},
  title        = {Peripheral Memory: {A} Technique for Fighting Memory Bandwidth Bottleneck},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {14},
  number       = {1},
  pages        = {54--57},
  year         = {2015},
  url          = {https://doi.org/10.1109/LCA.2014.2319077},
  doi          = {10.1109/LCA.2014.2319077},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cal/AzrielMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics