The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Catherine H. Gebotys" ( http://dblp.L3S.de/Authors/Catherine_H._Gebotys )

  Author page on DBLP  Author page in RDF  Community of Catherine H. Gebotys in ASPL-2

Publication years (Num. hits)
1988-1997 (17) 1998-2002 (15) 2003-2007 (15) 2008-2009 (15) 2010-2017 (15) 2018-2019 (4)
Publication types (Num. hits)
article(28) inproceedings(52) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 57 occurrences of 45 keywords

Results
Found 82 publication records. Showing 81 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mahmoud Khalafalla, Catherine H. Gebotys PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Haohao Liao, Catherine H. Gebotys Methodology for EM Fault Injection: Charge-based Fault Model. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Caio Hoffman, Catherine H. Gebotys, Diego F. Aranha, Mario L. Côrtes, Guido Araújo Circumventing Uniqueness of XOR Arbiter PUFs. Search on Bibsonomy DSD The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saeed Nejati, Jan Horácek, Catherine H. Gebotys, Vijay Ganesh Algebraic Fault Attack on SHA Hash Functions Using Programmatic SAT Solvers. Search on Bibsonomy CP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saeed Nejati, Jia Hui Liang, Catherine H. Gebotys, Krzysztof Czarnecki, Vijay Ganesh Adaptive Restart and CEGAR-Based Solver for Inverting Cryptographic Hash Functions. Search on Bibsonomy VSTTE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saeed Nejati, Zack Newsham, Joseph Scott, Jia Hui Liang, Catherine H. Gebotys, Pascal Poupart, Vijay Ganesh A Propagation Rate Based Splitting Heuristic for Divide-and-Conquer Solvers. Search on Bibsonomy SAT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Brian A. White, Edgar Mateos Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saeed Nejati, Jia Hui Liang, Vijay Ganesh, Catherine H. Gebotys, Krzysztof Czarnecki Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Catherine H. Gebotys, Brian A. White A Sliding Window Phase-Only Correlation Method for Side-Channel Alignment in a Smartphone. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Krithi Ramamritham, Catherine H. Gebotys Editorial Introduction of New Associate Editors. Search on Bibsonomy Embedded Systems Letters The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcio Juliato, Catherine H. Gebotys A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. Search on Bibsonomy IEEE Trans. Aerospace and Electronic Systems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López Hernandez Faster Explicit Formulas for Computing Pairings over Ordinary Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Khatib Zadeh, Catherine H. Gebotys, Shahab Ardalan Counteracting power analysis attack using Static Single-ended Logic. Search on Bibsonomy ISCAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benoît Badrignans, David Champagne, Reouven Elbaz, Catherine H. Gebotys, Lionel Torres SARFUM: Security Architecture for Remote FPGA Update and Monitoring. Search on Bibsonomy TRETS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrick Longa, Catherine H. Gebotys Efficient Techniques for High-Speed Elliptic Curve Cryptography. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López Hernandez Faster Explicit Formulas for Computing Pairings over Ordinary Curves. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Patrick Longa, Catherine H. Gebotys Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Edgar Mateos, Catherine H. Gebotys A new correlation frequency analysis of the side channel. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrick Longa, Catherine H. Gebotys Efficient Techniques for High-Speed Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Search on Bibsonomy Trans. Computational Science The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks
1Patrick Longa, Catherine H. Gebotys Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Amir Khatib Zadeh, Catherine H. Gebotys Leakage Power and Side Channel Security of Nanoscale Cryptosystem-on-Chip (CoC). Search on Bibsonomy ISVLSI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marcio Juliato, Catherine H. Gebotys Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. Search on Bibsonomy ReConFig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction
1Solmaz Ghaznavi, Catherine H. Gebotys, Reouven Elbaz Efficient Technique for the FPGA Implementation of the AES MixColumns Transformation. Search on Bibsonomy ReConFig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MixColumns, FPGA, architecture, AES, LUT
1Patrick Longa, Catherine H. Gebotys Novel Precomputation Schemes for Elliptic Curve Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication
1Patrick Longa, Catherine H. Gebotys Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system
1Amir Khatib Zadeh, Catherine H. Gebotys Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC). Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Brian A. White EM alignment using phase for secure embedded systems. Search on Bibsonomy Design Autom. for Emb. Sys. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Brian A. White EM analysis of a wireless Java-based PDA. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EM analysis, Side-channel analysis, countermeasures, power attacks
1Patrick Longa, Catherine H. Gebotys Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2008 DBLP  BibTeX  RDF
1Patrick Longa, Catherine H. Gebotys Novel Precomputation Schemes for Elliptic Curve Cryptosystems. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2008 DBLP  BibTeX  RDF
1David Champagne, Reouven Elbaz, Catherine H. Gebotys, Lionel Torres, Ruby B. Lee Forward-Secure Content Distribution to Reconfigurable Hardware. Search on Bibsonomy ReConFig The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, FPGA, Content Distribution, Broadcast Encryption, Forward-Secure
1Catherine H. Gebotys, Grant Martin (eds.) Proceedings of the 6th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2008, Atlanta, GA, USA, October 19-24, 2008 Search on Bibsonomy CODES+ISSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marcio Juliato, Catherine H. Gebotys An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks. Search on Bibsonomy AHS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amir Khatib Zadeh, Catherine H. Gebotys Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Brian A. White A Phase Substitution Technique for DEMA of Embedded Cryptographic Systems. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys A table masking countermeasure for low-energy secure embedded systems. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys A split-mask countermeasure for low-energy secure embedded systems. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EM analysis, Side channel analysis, countermeasures, power attacks
1Catherine H. Gebotys, Brian A. White Methodology for attack on a Java-based PDA. Search on Bibsonomy CODES+ISSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embedded system
1Radu Muresan, Catherine H. Gebotys Instantaneous current modeling in a complex VLIW processor core. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Instruction-level current model, current and power measurement in a processor, instantaneous current model, power and energy model
1Tim Woo, Catherine H. Gebotys, Sagar Naik An Energy-Efficient Image Representation for Secure Mobile Systems. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, C. C. Tiu, X. Chen A Countermeasure for EM Attack of a Wireless PDA. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Simon Ho, C. C. Tiu EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Design of secure cryptography against the threat of power-attacks in DSP-embedded processors. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF VLIW
1Peter Marwedel, Catherine H. Gebotys Secure and safety-critical vs. insecure, non safety-critical embedded systems: do they require completely different design approaches? Search on Bibsonomy CODES+ISSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, safety-critical
1Radu Muresan, Catherine H. Gebotys Current flattening in software and hardware for security applications. Search on Bibsonomy CODES+ISSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF current flattening, hardware architecture, power analysis attacks
1Catherine H. Gebotys Low energy security optimization in embedded cryptographic systems. Search on Bibsonomy CODES+ISSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF embedded, smart cards, power analysis, countermeasure
1Catherine H. Gebotys, Robert J. Gebotys A Framework for Security on NoC Technologies. Search on Bibsonomy ISVLSI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Y. Zhang Security wrappers and power analysis for SoC technologies. Search on Bibsonomy CODES+ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, performance, design, VLIW, adiabatic
1Catherine H. Gebotys A network flow approach to memory bandwidth utilization in embedded DSP core processors. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hiroto Yasuura, Naofumi Takagi, Srivaths Ravi 0001, Michael Torla, Catherine H. Gebotys Special Session: Security on SoC. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF sequence charts, simulation, validation methodology
1Catherine H. Gebotys Security-Driven Exploration of Cryptography in DSP Cores. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF methodology, DSP, low energy, power analysis attack
1Catherine H. Gebotys, Robert J. Gebotys Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Radu Muresan, Catherine H. Gebotys Current consumption dynamics at instruction and program level for a VLIW DSP processor. Search on Bibsonomy ISSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Utilizing Memory Bandwidth in DSP Embedded Processors. Search on Bibsonomy DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Radu Muresan Modeling Power Dynamics for an Embedded DSP Processor Core. An Empirical Model. Search on Bibsonomy VLSI-SOC The full citation details ... 2001 DBLP  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys, S. Wiratunga Power minimization derived from architectural-usage of VLIW processors. Search on Bibsonomy DAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Statistically based prediction of power dissipation for complex embedded DSP processors. Search on Bibsonomy Microprocessors and Microsystems - Embedded Hardware Design The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys A minimum-cost circulation approach to DSP address-code generation. Search on Bibsonomy IEEE Trans. on CAD of Integrated Circuits and Systems The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Designing for Low Power in Complex Embedded DSP Systems. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Optimizing Energy During Systems Synthesis of Computer Intensive Realtime Applications. Search on Bibsonomy VLSI Design The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Network Flow Approach to Data Regeneration for Low Energy Embedded System Synthesis. Search on Bibsonomy Integrated Computer-Aided Engineering The full citation details ... 1998 DBLP  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys An empirical comparison of algorithmic, instruction, and architectural power prediction models for high performance embedded DSP processors. Search on Bibsonomy ISLPED The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Complexities in DSP Software Compilation: Performance, Code Size Power, Retargetability. Search on Bibsonomy HICSS (3) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Sarita V. Adve, Doug Burger, Rudolf Eigenmann, Alasdair Rawsthorne, Michael D. Smith 0001, Catherine H. Gebotys, Mahmut T. Kandemir, David J. Lilja, Alok N. Choudhary, Jesse Zhixi Fang, Pen-Chung Yew Changing Interaction of Compiler and Architecture. Search on Bibsonomy IEEE Computer The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys An Efficient Model for DSP Code Generation: Performance, Code Size, Estimated Energy. Search on Bibsonomy ISSS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys DSP address optimization using a minimum cost circulation technique. Search on Bibsonomy ICCAD The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSP software compliation, DSP addressing, Applied Optimization, Network Flow, software synthesis
1Catherine H. Gebotys, Robert J. Gebotys Performance-Power Optimization of Memory Components for Complex Embedded Systems. Search on Bibsonomy HICSS (5) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Low Energy Memory and Register Allocation Using Network Flow. Search on Bibsonomy DAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Power Minimization in Heterogeneous Processing. Search on Bibsonomy HICSS (1) The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys An optimal methodology for synthesis of DSP multichip architectures. Search on Bibsonomy VLSI Signal Processing The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Optimized mapping of video applications to hardware-software for VLSI architectures. Search on Bibsonomy HICSS (1) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF integer optimization, video computations, video systems, optimized mapping, scheduling, VLSI, optimisation, VLSI architectures, video signal processing, VLIW processor
1Catherine H. Gebotys An optimization approach to the synthesis of multichip architectures. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Robert J. Gebotys Application-Specific Architectures for Field-Programmable VLSI Technologies. Search on Bibsonomy HICSS (1) The full citation details ... 1994 DBLP  BibTeX  RDF
1Catherine H. Gebotys Throughput optimized architectural synthesis. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Mohamed I. Elmasry Global optimization approach for architectural synthesis. Search on Bibsonomy IEEE Trans. on CAD of Integrated Circuits and Systems The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Optimal synthesis of multichip architectures. Search on Bibsonomy ICCAD The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys Optimal Scheduling and Allocation of Embedded VLSI Chips. Search on Bibsonomy DAC The full citation details ... 1992 DBLP  BibTeX  RDF
1Catherine H. Gebotys, Mohamed I. Elmasry Simultaneous Scheduling and Allocation for Cost Constrained Optimal Architectural Synthesis. Search on Bibsonomy DAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Mohamed I. Elmasry A Global Optimization Approach for Architectural Synthesis. Search on Bibsonomy ICCAD The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Catherine H. Gebotys, Mohamed I. Elmasry VLSI Design Synthesis with Testability. Search on Bibsonomy DAC The full citation details ... 1988 DBLP  BibTeX  RDF
Displaying result #1 - #81 of 81 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license