Search

Your search keyword '"Leupers, Rainer"' showing total 1,120 results

Search Constraints

Start Over You searched for: Author "Leupers, Rainer" Remove constraint Author: "Leupers, Rainer"
1,120 results on '"Leupers, Rainer"'

Search Results

1. Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction

2. A Calibratable Model for Fast Energy Estimation of MVM Operations on RRAM Crossbars

3. A Fully Automated Platform for Evaluating ReRAM Crossbars

4. QTFlow: Quantitative Timing-Sensitive Information Flow for Security-Aware Hardware Design on RTL

5. Mapping of CNNs on multi-core RRAM-based CIM architectures

6. parti-gem5: gem5's Timing Mode Parallelised

7. SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors

8. Work-in-Progress: A Universal Instrumentation Platform for Non-Volatile Memories

9. Gate Camouflaging Using Reconfigurable ISFET-Based Threshold Voltage Defined Logic

10. Automated Information Flow Analysis for Integrated Computing-in-Memory Modules

11. Fault Injection in Native Logic-in-Memory Computation on Neuromorphic Hardware

16. Einführung

23. Quantitative Information Flow for Hardware: Advancing the Attack Landscape

24. A Temperature Independent Readout Circuit for ISFET-Based Sensor Applications

25. Enhancing HW-SW Confidentiality Verification for Embedded Processors with SoftFlow’s Advanced Memory Range Feature

26. Architecture-Compiler Co-design for ReRAM-Based Multi-core CIM Architectures

27. NISTT: A Non-Intrusive SystemC-TLM 2.0 Tracing Tool

28. PA-PUF: A Novel Priority Arbiter PUF

29. EmuNoC: Hybrid Emulation for Fast and Flexible Network-on-Chip Prototyping on FPGAs

31. X-Fault: Impact of Faults on Binary Neural Networks in Memristor-Crossbar Arrays with Logic-in-Memory Computation

32. Designing ML-Resilient Locking at Register-Transfer Level

33. pHGen: A pH-Based Key Generation Mechanism Using ISFETs

34. A Parallel SystemC Virtual Platform for Neuromorphic Architectures

35. NeuroHammer: Inducing Bit-Flips in Memristive Crossbar Memories

36. QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog

45. Background

46. Introduction

48. Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

49. Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

50. Brightening the Optical Flow through Posit Arithmetic

Catalog

Books, media, physical & digital resources