default search action
Sandhya Koteshwara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Wei Ren, Sandhya Koteshwara, Mengmei Ye, Hubertus Franke, Deming Chen:
S2TAR: Shared Secure Trusted Accelerators with Reconfiguration for Machine Learning in the Cloud. CLOUD 2024: 267-278 - [c13]Lars Schneidenbach, Sandhya Koteshwara, Martin Ohmacht, Apoorve Mohan, Eun Kyung Lee:
STRonG: System Topology Risk Analysis on Graphs. CCGrid 2024: 453-464 - [c12]Mengmei Ye, Sandhya Koteshwara, Derren Dunn, Hubertus Franke, Chris Porter, Tobin Feldman-Fitzthum, Angelo Ruocco, Daniele Buono, Cláudio Carvalho:
Position Paper: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride. HASP@MICRO 2024: 19-27 - 2023
- [c11]Wei Ren, William Kozlowski, Sandhya Koteshwara, Mengmei Ye, Hubertus Franke, Deming Chen:
AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators. DAC 2023: 1-6 - 2021
- [c10]Sandhya Koteshwara:
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis. AsianHOST 2021: 1-4 - 2020
- [j5]Rijoy Mukherjee, Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty:
Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure. J. Hardw. Syst. Secur. 4(4): 343-360 (2020) - [c9]Sandhya Koteshwara, Manoj Kumar, Pratap Pattnaik:
Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors. ISPASS 2020: 223-225 - [c8]Sandhya Koteshwara, Manoj Kumar, Pratap Pattnaik:
Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads. HASP@MICRO 2020: 2:1-2:9
2010 – 2019
- 2019
- [j4]Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi:
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms. IEEE Trans. Very Large Scale Integr. Syst. 27(5): 1053-1066 (2019) - [c7]Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty:
ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch. SPACE 2019: 159-175 - 2018
- [j3]Sandhya Koteshwara, Keshab K. Parhi:
Incremental-Precision Based Feature Computation and Multi-Level Classification for Low-Energy Internet-of-Things. IEEE J. Emerg. Sel. Topics Circuits Syst. 8(4): 822-835 (2018) - [j2]Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi:
Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design. IEEE Trans. Inf. Forensics Secur. 13(1): 79-93 (2018) - [c6]Sandhya Koteshwara, Keshab K. Parhi:
Low-Energy Architectures of Linear Classifiers for IoT Applications using Incremental Precision and Multi-Level Classification. ACM Great Lakes Symposium on VLSI 2018: 291-296 - 2017
- [j1]Sandhya Koteshwara, Amitabh Das:
Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications. IEEE Des. Test 34(4): 26-33 (2017) - [c5]Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi:
Functional encryption of integrated circuits by key-based hybrid obfuscation. ACSSC 2017: 484-488 - [c4]Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi:
Performance comparison of AES-GCM-SIV and AES-GCM algorithms for authenticated encryption on FPGA platforms. ACSSC 2017: 1331-1336 - [c3]Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi:
FPGA implementation and comparison of AES-GCM and Deoxys authenticated encryption schemes. ISCAS 2017: 1-4 - [c2]Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi:
Hierarchical functional obfuscation of integratec circuits using a mode-based approach. ISCAS 2017: 1-4 - 2016
- [c1]Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi:
Mode-based Obfuscation using Control-Flow Modifications. CS2@HiPEAC 2016: 19-24
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint