Memory interface including an efficient variable-width bus O Falik, L Azriel US Patent 8,200,879, 2012 | 53 | 2012 |
Dana-universal dataflow analysis for gate-level netlist reverse engineering N Albartus, M Hoffmann, S Temme, L Azriel, C Paar Cryptology ePrint Archive, 2020 | 48 | 2020 |
A survey of algorithmic methods in IC reverse engineering L Azriel, J Speith, N Albartus, R Ginosar, A Mendelson, C Paar Journal of Cryptographic Engineering 11 (3), 299-315, 2021 | 29 | 2021 |
SoK: An overview of algorithmic methods in IC reverse engineering L Azriel, R Ginosar, A Mendelson Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware …, 2019 | 20 | 2019 |
Exploiting the scan side channel for reverse engineering of a VLSI device L Azriel, R Ginosar, A Mendelson Technion, Israel Institute of Technology, Tech. Rep. CCIT Report 897, 2016 | 18 | 2016 |
Using scan side channel to detect IP theft L Azriel, R Ginosar, S Gueron, A Mendelson IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017 | 16 | 2017 |
Revealing on-chip proprietary security functions with scan side channel based reverse engineering L Azriel, R Ginosar, A Mendelson Proceedings of the on Great Lakes Symposium on VLSI 2017, 233-238, 2017 | 15 | 2017 |
Towards a memristive hardware secure hash function (memhash) L Azriel, S Kvatinsky 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 15 | 2017 |
Method and apparatus for limiting the output frequency of an on-chip clock generator Z Hershman, A Koren, L Azriel US Patent 7,472,305, 2008 | 10 | 2008 |
Memresistive security hash function S Kvatinsky, L Azriel US Patent 10,708,041, 2020 | 9 | 2020 |
Peripheral memory: a technique for fighting memory bandwidth bottleneck L Azriel, A Mendelson, U Weiser IEEE Computer Architecture Letters 14 (1), 54-57, 2014 | 9 | 2014 |
Fault protection for high-fanout signal distribution circuitry N Tasher, V Teper, L Azriel US Patent 9,397,663, 2016 | 7 | 2016 |
Using scan side channel for detecting IP theft L Azriel, R Ginosar, S Gueron, A Mendelson Proceedings of the Hardware and Architectural Support for Security and …, 2016 | 6 | 2016 |
First full-fledged side channel attack on HMAC-SHA-2 Y Belenky, I Dushar, V Teper, H Chernyshchyk, L Azriel, Y Kreimer International Workshop on Constructive Side-Channel Analysis and Secure …, 2021 | 4 | 2021 |
Memory-side protection with a capability enforcement co-processor L Azriel, L Humbel, R Achermann, A Richardson, M Hoffmann, ... ACM Transactions on Architecture and Code Optimization (TACO) 16 (1), 1-26, 2019 | 4 | 2019 |
Redundancy aes masking basis for attack mitigation (rambam) Y Belenky, V Bugaenko, L Azriel, H Chernyshchyk, I Dushar, O Karavaev, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 69-91, 2022 | 2 | 2022 |
Towards Open Scan for the Open-Source Hardware L Azriel, A Mendelson Cryptology ePrint Archive, 2023 | 1 | 2023 |
Enforcement of memory reference object loading indirection DS Milojicic, L Azriel, L Humbel US Patent 10,846,016, 2020 | 1 | 2020 |
Exploring the Limitations of the Property-based Hardware-Trojan Detection Methods S Zaken, K Meir, L Azriel, T Rindenau, A Mendelson 2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS …, 2023 | | 2023 |
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2 Y Belenky, I Dushar, V Teper, V Bugaenko, O Karavaev, L Azriel, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (3), 1-29, 2023 | | 2023 |