Follow
Karthikeyan Nagarajan
Title
Cited by
Cited by
Year
Hardware trojans in emerging non-volatile memories
MNI Khan, K Nagarajan, S Ghosh
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 396-401, 2019
272019
ENTT: A family of emerging NVM-based trojan triggers
K Nagarajan, MNI Khan, S Ghosh
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
242019
HarTBleed: Using hardware Trojans for data leakage exploits
A De, MNI Khan, K Nagarajan, S Ghosh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (4), 968-979, 2020
212020
SHINE: A novel SHA-3 implementation using ReRAM-based in-memory computing
K Nagarajan, SS Ensan, MNI Khan, S Ghosh, A Chattopadhyay
2019 IEEE/ACM International Symposium on Low Power Electronics and Design …, 2019
112019
SCARE: Side channel attack on in-memory computing for reverse engineering
SS Ensan, K Nagarajan, MNI Khan, S Ghosh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (12 …, 2021
102021
TrappeD: DRAM trojan designs for information leakage and fault injection attacks
K Nagarajan, A De, MNI Khan, S Ghosh
Microprocessor test and validation, 2019
82019
Secnvm: Power side-channel elimination using on-chip capacitors for highly secure emerging nvm
K Nagarajan, FU Ahmed, MNI Khan, A De, MH Chowdhury, S Ghosh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (8 …, 2021
62021
Fault Injection Attacks in Spiking Neural Networks and Countermeasures
K Nagarajan, J Li, SS Ensan, S Kannan, S Ghosh
Frontiers in Nanotechnology, 97, 2022
52022
Analysis of power-oriented fault injection attacks on spiking neural networks
K Nagarajan, J Li, SS Ensan, MNI Khan, S Kannan, S Ghosh
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 861-866, 2022
42022
IMACE: In-memory acceleration of classic McEliece encoder
K Nagarajan, SS Ensan, S Mandal, S Ghosh, A Chattopadhyay
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 513-518, 2019
42019
SCANN: Side Channel Analysis of Spiking Neural Networks
K Nagarajan, R Roy, RO Topaloglu, S Kannan, S Ghosh
Cryptography 7 (2), 17, 2023
32023
Recent advances in emerging technology-based security primitives, attacks and mitigation
K Nagarajan, A De, SS Ensan, A Ash-Saki, MNI Khan, S Ghosh
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020
22020
Hands-on cybersecurity curriculum using a modular training kit
A De, S Ghosh
ASEE annual conference, 2020
12020
EXPLORING SECURITY CHALLENGES AND OPPORTUNITIES IN EMERGING MEMORY AND COMPUTING TECHNOLOGIES
K Nagarajan
The Pennsylvania State University, 2022
2022
ENTT/ENTTR: A Family of Improved Emerging NVM-based Trojan Triggers and Resets
K Nagarajan, MNI Khan, S Ghosh
Frontiers in Nanotechnology, 22, 2022
2022
Malicious Attacks Mitigation Performance and Security Analysis of Parameter-Obfuscated Analog Circuits...... V. Venugopal Rao and I. Savidis 2013 Secure XOR-CIM Engine: Compute …
S Huang, H Jiang, X Peng, W Li, S Yu, SS Ensan, K Nagarajan, MNI Khan, ...
2021
2020 BEST PIC I PAPER WINNER-Hands-On Cybersecurity Curriculum Using a Modular Training Kit
A De, MNI Khan, K Nagarajan, AA Saki, MM Alam, TS Wood, M Johnson, ...
2021 ASEE Virtual Annual Conference Content Access, 2021
2021
Hands-on Cybersecurity Curriculum Using a Modular Training Kit
MNI Khan, K Nagarajan, AA Saki, M Alam, TS Wood, M Johnson, ...
2020 ASEE Virtual Annual Conference Content Access, 2020
2020
Reliable Circuits DAD-FF: Hardening Designs by Delay-Adjustable D-Flip-Flop for Soft-Error-Rate Reduction..........................
A De, MNI Khan, K Nagarajan, S Ghosh
2020
Meeting the Conflicting Goals of Low-Power and Resiliency Using Emerging Memories
K Nagarajan, MNI Khan, SS Ensan, A Ash-Saki, S Ghosh
2019 IEEE 25th International Symposium on On-Line Testing and Robust System …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20