default search action
Aydin Aysu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Furkan Aydin, Aydin Aysu:
Leaking secrets in homomorphic encryption with side-channel attacks. J. Cryptogr. Eng. 14(2): 241-251 (2024) - [j16]Arsalan Ali Malik, Emre Karabulut, Amro Awad, Aydin Aysu:
Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems. J. Hardw. Syst. Secur. 8(2): 94-112 (2024) - [j15]Emre Karabulut, Aydin Aysu:
Masking FALCON's Floating-Point Multiplication in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 483-508 (2024) - [c48]Furkan Aydin, Emre Karabulut, Aydin Aysu:
Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware. ACM Great Lakes Symposium on VLSI 2024: 495 - [c47]Emre Karabulut, Aydin Aysu:
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature. HOST 2024: 90-100 - [i23]Chao Lu, Esha Telang, Aydin Aysu, Kanad Basu:
Quantum Leak: Timing Side-Channel Attacks on Cloud-Based Quantum Services. CoRR abs/2401.01521 (2024) - [i22]Emre Karabulut, Arsalan Ali Malik, Amro Awad, Aydin Aysu:
THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs. CoRR abs/2404.00507 (2024) - 2023
- [j14]Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu:
SeqL+: Secure Scan-Obfuscation With Theoretical and Empirical Validation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(5): 1406-1410 (2023) - [c46]Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. HOST 2023: 155-166 - [c45]Emre Karabulut, Amro Awad, Aydin Aysu:
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs. ISCAS 2023: 1-5 - [c44]Anuj Dubey, Aydin Aysu:
A Full-Stack Approach for Side-Channel Secure ML Hardware. ITC 2023: 186-195 - [c43]Ahmet Can Mert, Ferhat Yaman, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Aydin Aysu:
A Survey of Software Implementations for the Number Theoretic Transform. SAMOS 2023: 328-344 - [i21]Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. IACR Cryptol. ePrint Arch. 2023: 163 (2023) - [i20]Emre Karabulut, Aydin Aysu:
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature. IACR Cryptol. ePrint Arch. 2023: 908 (2023) - [i19]Furkan Aydin, Aydin Aysu:
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1128 (2023) - 2022
- [j13]Anuj Dubey, Rosario Cammarota, Vikram B. Suresh, Aydin Aysu:
Guarding Machine Learning Hardware Against Physical Side-channel Attacks. ACM J. Emerg. Technol. Comput. Syst. 18(3): 56:1-56:31 (2022) - [j12]Emre Karabulut, Erdem Alkim, Aydin Aysu:
Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography. IEEE Trans. Computers 71(8): 1810-1823 (2022) - [j11]Ahmet Can Mert, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Aydin Aysu:
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform. IEEE Trans. Computers 71(11): 2829-2843 (2022) - [j10]Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu:
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 506-556 (2022) - [c42]Anuj Dubey, Emre Karabulut, Amro Awad, Aydin Aysu:
High-Fidelity Model Extraction Attacks via Remote Power Monitors. AICAS 2022: 328-331 - [c41]Furkan Aydin, Aydin Aysu:
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library. ASHES@CCS 2022: 95-100 - [c40]Emre Karabulut, Chandu Yuvarajappa, Mohammed Iliyas Shaik, Seetal Potluri, Amro Awad, Aydin Aysu:
PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs. ASHES@CCS 2022: 101-106 - [c39]Aydin Aysu:
Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety. CCSW 2022: 7-8 - [c38]Gregor Haas, Aydin Aysu:
Apple vs. EMA: electromagnetic side channel attacks on apple CoreCrypto. DAC 2022: 247-252 - [c37]Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu:
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library. DATE 2022: 1527-1532 - [c36]Archit Gajjar, Priyank Kashyap, Aydin Aysu, Paul D. Franzon, Sumon Dey, Chris Cheng:
FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS. FCCM 2022: 1-9 - [c35]Ashley Calhoun, Erick Ortega, Ferhat Yaman, Anuj Dubey, Aydin Aysu:
Hands-On Teaching of Hardware Security for Machine Learning. ACM Great Lakes Symposium on VLSI 2022: 455-461 - [c34]Hossein Sayadi, Mehrdad Aliasgari, Furkan Aydin, Seetal Potluri, Aydin Aysu, Jack Edmonds, Sara Tehranipoor:
Towards AI-Enabled Hardware Security: Challenges and Opportunities. IOLTS 2022: 1-10 - [i18]Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu:
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library. IACR Cryptol. ePrint Arch. 2022: 204 (2022) - [i17]Gregor Haas, Aydin Aysu:
Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto. IACR Cryptol. ePrint Arch. 2022: 230 (2022) - [i16]Emre Karabulut, Erdem Alkim, Aydin Aysu:
Single-Trace Side-Channel Attacks on Ï-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM. IACR Cryptol. ePrint Arch. 2022: 494 (2022) - 2021
- [j9]Priyank Kashyap, Furkan Aydin, Seetal Potluri, Paul D. Franzon, Aydin Aysu:
2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1217-1229 (2021) - [j8]Furkan Aydin, Aydin Aysu, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky:
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols. ACM Trans. Embed. Comput. Syst. 20(6): 110:1-110:22 (2021) - [c33]Emre Karabulut, Aydin Aysu:
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks. DAC 2021: 691-696 - [c32]Emre Karabulut, Erdem Alkim, Aydin Aysu:
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM. HOST 2021: 35-45 - [c31]Gregor Haas, Seetal Potluri, Aydin Aysu:
iTimed: Cache Attacks on the Apple A10 Fusion SoC. HOST 2021: 80-90 - [c30]Seetal Potluri, Aydin Aysu:
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware. ICCAD 2021: 1-8 - [c29]Zhaohui Chen, Emre Karabulut, Aydin Aysu, Yuan Ma, Jiwu Jing:
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature. ICCD 2021: 583-590 - [i15]Anuj Dubey, Rosario Cammarota, Vikram B. Suresh, Aydin Aysu:
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks. CoRR abs/2109.00187 (2021) - [i14]Seetal Potluri, Aydin Aysu:
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware. IACR Cryptol. ePrint Arch. 2021: 167 (2021) - [i13]Gregor Haas, Seetal Potluri, Aydin Aysu:
iTimed: Cache Attacks on the Apple A10 Fusion SoC. IACR Cryptol. ePrint Arch. 2021: 464 (2021) - [i12]Emre Karabulut, Aydin Aysu:
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2021: 772 (2021) - [i11]Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu:
SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation. IACR Cryptol. ePrint Arch. 2021: 1245 (2021) - [i10]Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu:
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking. IACR Cryptol. ePrint Arch. 2021: 1437 (2021) - 2020
- [j7]Erdem Ozcan, Aydin Aysu:
High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems. IEEE Embed. Syst. Lett. 12(4): 133-136 (2020) - [c28]Ahmet Can Mert, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Michela Becchi, Aydin Aysu:
A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography. DATE 2020: 346-351 - [c27]Emre Karabulut, Aydin Aysu:
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform. FPL 2020: 26-32 - [c26]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection. HOST 2020: 197-208 - [c25]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
BoMaNet: Boolean Masking of an Entire Neural Network. ICCAD 2020: 51:1-51:9 - [c24]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul D. Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c23]Qinhan Tan, Seetal Potluri, Aydin Aysu:
Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors. ISCAS 2020: 1-5 - [c22]Seetal Potluri, Aydin Aysu, Akash Kumar:
SeqL: Secure Scan-Locking for IP Protection. ISQED 2020: 7-13 - [c21]Furkan Aydin, Priyank Kashyap, Seetal Potluri, Paul D. Franzon, Aydin Aysu:
DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks. SAMOS 2020: 262-280 - [i9]Seetal Potluri, Aydin Aysu, Akash Kumar:
SeqL: Secure Scan-Locking for IP Protection. CoRR abs/2005.13032 (2020) - [i8]Qinhan Tan, Seetal Potluri, Aydin Aysu:
Efficacy of Satisfiability Based Attacks in the Presence of Circuit Reverse Engineering Errors. CoRR abs/2005.13048 (2020) - [i7]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
BoMaNet: Boolean Masking of an Entire Neural Network. CoRR abs/2006.09532 (2020) - [i6]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020)
2010 – 2019
- 2019
- [c20]Abdullah Varici, Gurol Saglam, Seckin Ipek, Abdullah Yildiz, Sezer Gören, Aydin Aysu, Deniz Iskender, T. Baris Aktemur, H. Fatih Ugurdag:
Fast and Efficient Implementation of Lightweight Crypto Algorithm PRESENT on FPGA through Processor Instruction Set Extension. EWDTS 2019: 1-5 - [c19]Aydin Aysu:
Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers. ACM Great Lakes Symposium on VLSI 2019: 237-242 - [c18]Shijia Wei, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer, Mohit Tiwari:
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems. HOST 2019: 111-120 - [i5]Anuj Dubey, Rosario Cammarota, Aydin Aysu:
MaskedNet: A Pathway for Secure Inference against Power Side-Channel Attacks. CoRR abs/1910.13063 (2019) - 2018
- [c17]Aydin Aysu, Michael Orshansky, Mohit Tiwari:
Binary Ring-LWE hardware with power side-channel countermeasures. DATE 2018: 1253-1258 - [c16]Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky:
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. HOST 2018: 81-88 - [c15]Xiaodan Xi, Aydin Aysu, Michael Orshansky:
Fresh re-keying with strong PUFs: A new approach to side-channel security. HOST 2018: 118-125 - 2017
- [c14]Aydin Aysu, Ye Wang, Patrick Schaumont, Michael Orshansky:
A new maskless debiasing method for lightweight physical unclonable functions. HOST 2017: 134-139 - 2016
- [b1]Aydin Aysu:
Resource-constrained and Resource-efficient Modern Cryptosystem Design. Virginia Tech, Blacksburg, VA, USA, 2016 - [j6]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont:
Compact and low-power ASIP design for lightweight PUF-based authentication protocols. IET Inf. Secur. 10(5): 232-241 (2016) - [j5]Aydin Aysu, Patrick Schaumont:
Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms. IEEE Trans. Computers 65(9): 2925-2931 (2016) - [c13]Aydin Aysu, Shravya Gaddam, Harsha Mandadi, Carol Pinto, Luke Wegryn, Patrick Schaumont:
A design method for remote integrity checking of complex PCBs. DATE 2016: 1517-1522 - [c12]Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. ICISC 2016: 28-48 - 2015
- [j4]Aydin Aysu, Patrick Schaumont:
Hardware/software co-design of physical unclonable function based authentications on FPGAs. Microprocess. Microsystems 39(7): 589-597 (2015) - [j3]Aydin Aysu, Bilgiday Yuce, Patrick Schaumont:
The Future of Real-Time Security: Latency-Optimized Lattice-Based Digital Signatures. ACM Trans. Embed. Comput. Syst. 14(3): 43:1-43:18 (2015) - [c11]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. CHES 2015: 556-576 - [c10]Ege Gulcan, Aydin Aysu, Patrick Schaumont:
BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications. INDOCRYPT 2015: 329-346 - [i4]Aydin Aysu, Patrick Schaumont:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. IACR Cryptol. ePrint Arch. 2015: 288 (2015) - [i3]Ege Gulcan, Aydin Aysu, Patrick Schaumont:
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2015: 744 (2015) - [i2]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol. IACR Cryptol. ePrint Arch. 2015: 937 (2015) - 2014
- [j2]Aydin Aysu, Ege Gulcan, Patrick Schaumont:
SIMON Says: Break Area Records of Block Ciphers on FPGAs. IEEE Embed. Syst. Lett. 6(2): 37-40 (2014) - [c9]Nahid Farhady Ghalaty, Aydin Aysu, Patrick Schaumont:
Analyzing and eliminating the causes of fault sensitivity analysis. DATE 2014: 1-6 - [c8]Ilker Hamzaoglu, Aydin Aysu, Onur Can Ulusel:
A low power adaptive H.264 video encoder hardware. ICCE-Berlin 2014: 395-399 - [c7]Ege Gulcan, Aydin Aysu, Patrick Schaumont:
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher. LightSec 2014: 34-50 - [i1]Aydin Aysu, Ege Gulcan, Patrick Schaumont:
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs. IACR Cryptol. ePrint Arch. 2014: 237 (2014) - 2013
- [c6]Aydin Aysu, Nahid Farhady Ghalaty, Zane R. Franklin, Moein Pahlavan Yali, Patrick Schaumont:
Digital fingerprints for low-cost platforms using MEMS sensors. WESS 2013: 2:1-2:6 - [c5]Aydin Aysu, Cameron Patterson, Patrick Schaumont:
Low-cost and area-efficient FPGA implementations of lattice-based cryptography. HOST 2013: 81-86 - [c4]Aydin Aysu, Patrick Schaumont:
PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs. ReConFig 2013: 1-6 - [c3]Patrick Schaumont, Aydin Aysu:
Three Design Dimensions of Secure Embedded Systems. SPACE 2013: 1-20 - [c2]Aydin Aysu, Murat Sayinta, Cevahir Cigla:
Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications. VLSI-SoC 2013: 204-209 - 2011
- [j1]Aydin Aysu, Gokhan Sayilar, Ilker Hamzaoglu:
A low energy adaptive hardware for H.264 multiple reference frame motion estimation. IEEE Trans. Consumer Electron. 57(3): 1377-1383 (2011) - 2010
- [c1]Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas:
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. SIN 2010: 168-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint