Preventing IC piracy using reconfigurable logic barriers A Baumgarten, A Tyagi, J Zambreno IEEE design & Test of computers 27 (1), 66-75, 2010 | 420 | 2010 |
A reduced-area scheme for carry-select adders A Tyagi IEEE Transactions on Computers 42 (10), 1163-1170, 1993 | 374 | 1993 |
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System M Gomathisankaran, A Tyagi, K Namuduri 2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011 | 93 | 2011 |
A reconfigurable multi-function computing cache architecture HS Kim, AK Somani, A Tyagi Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field …, 2000 | 85 | 2000 |
Control flow based obfuscation J Ge, S Chaudhuri, A Tyagi Proceedings of the 5th ACM workshop on Digital rights management, 83-92, 2005 | 67 | 2005 |
Hercules: a power analyzer for MOS VLSI circuits," A Tyagi Proceedings of the, 530-533, 1987 | 51 | 1987 |
Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly J Park, A Tyagi IEEE Consumer Electronics Magazine 6 (3), 92-102, 2017 | 47 | 2017 |
Efficient parallel algorithms for optical computing with the discrete Fourier transform (DFT) primitive JH Reif, A Tyagi Applied optics 36 (29), 7327-7340, 1997 | 46 | 1997 |
Protection against indirect overflow attacks on pointers G Zhu, A Tyagi Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004 | 41 | 2004 |
Low power FSM design using Huffman-style encoding P Surti, LF Chao, A Tyagi Proceedings European Design and Test Conference. ED & TC 97, 521-525, 1997 | 39 | 1997 |
Re-encoding for low power state assignment of FSMs V Veeramachaneni, A Tyagi, S Rajgopal Proceedings of the 1995 international symposium on Low power design, 173-178, 1995 | 33 | 1995 |
Configuration caching vs data caching for striped FPGAs D Deshpande, AK Somani, A Tyagi Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999 | 28 | 1999 |
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks. G Lee, A Tyagi International Conference on Internet Computing, 387-394, 2000 | 27 | 2000 |
Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication RA Scheel, A Tyagi Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015 | 24 | 2015 |
A novel charge recycling design scheme based on adiabatic charge pump KM Keung, V Manne, A Tyagi IEEE transactions on very large scale integration (VLSI) systems 15 (7), 733-745, 2007 | 23 | 2007 |
GEEP: a low power genetic algorithm layout system G Holt, A Tyagi Proceedings of the 39th Midwest Symposium on Circuits and Systems 3, 1337-1340, 1996 | 22 | 1996 |
Energy-time trade-offs in VLSI computations A Tyagi International Conference on Foundations of Software Technology and …, 1989 | 19 | 1989 |
Continuous transparent mobile device touchscreen soft keyboard biometric authentication T Dee, I Richardson, A Tyagi 2019 32nd international conference on vlsi design and 2019 18th …, 2019 | 18 | 2019 |
Dynamic branch decoupled architecture A Tyagi, HC Ng, P Mohapatra Proceedings 1999 IEEE International Conference on Computer Design: VLSI in …, 1999 | 18 | 1999 |
Developing and teaching an integrated series of courses in embedded computer systems M Bezdek, D Helvick, R Mercado, D Rover, A Tyagi, Z Zhang Proceedings. Frontiers in Education. 36th Annual Conference, 19-24, 2006 | 17 | 2006 |