Follow
C Gebotys
C Gebotys
University of Waterloo
No verified email
Title
Cited by
Cited by
Year
Faster explicit formulas for computing pairings over ordinary curves
DF Aranha, K Karabina, P Longa, CH Gebotys, J López
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
2702011
Global optimization approach for architectural synthesis
CH Gebotys, MI Elmasry
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1993
1971993
EM analysis of Rijndael and ECC on a wireless Java-based PDA
CH Gebotys, S Ho, CC Tiu
International Workshop on Cryptographic Hardware and Embedded Systems, 250-264, 2005
1782005
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres
Transactions on Computational Science IV: Special Issue on Security in …, 2009
1172009
Low energy memory and register allocation using network flow
CH Gebotys
Proceedings of the 34th Annual Design Automation Conference, 435-440, 1997
1131997
Optimal VLSI architectural synthesis: area, performance and testability
CH Gebotys, MI Elmasry
Springer Science & Business Media, 2012
1082012
PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs
M Khalafalla, C Gebotys
2019 Design, automation & test in Europe conference & exhibition (DATE), 204-209, 2019
1062019
Simultaneous scheduling and allocation for cost constrained optimal architectural synthesis
CH Gebotys, MI Elmasry
Proceedings of the 28th ACM/IEEE Design Automation Conference, 2-7, 1991
1041991
A framework for security on NoC technologies
CH Gebotys, RJ Gebotys
IEEE Computer Society Annual Symposium on VLSI, 2003. Proceedings., 113-117, 2003
992003
Optimal synthesis of high-performance architectures
CH Gebotys, MI Elmasry
IEEE Journal of Solid-State Circuits 27 (3), 389-397, 1992
861992
Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor
CH Gebotys, RJ Gebotys
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
762003
DSP address optimization using a minimum cost circulation technique
Gebotys
1997 Proceedings of IEEE International Conference on Computer Aided Design …, 1997
691997
A table masking countermeasure for low-energy secure embedded systems
CH Gebotys
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14 (7), 740-753, 2006
662006
Efficient techniques for high-speed elliptic curve cryptography
P Longa, C Gebotys
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
622010
Security in embedded devices
CH Gebotys
Springer Science & Business Media, 2009
622009
VLSI design synthesis with testability
CH Gebotys, MI Elmasry
Annual ACM IEEE Design Automation Conference: Proceedings of the 25 th ACM …, 1988
571988
Optimal scheduling and allocation of embedded VLSI chips
CH Gebotys
Annual ACM IEEE Design Automation Conference: Proceedings of the 29 th ACM …, 1992
561992
Current flattening in software and hardware for security applications
R Muresan, C Gebotys
Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware …, 2004
542004
An empirical comparison of algorithmic, instruction, and architectural power prediction models for high performance embedded DSP processors
CH Gebotys, RJ Gebotys
Proceedings of the 1998 international symposium on Low power electronics and …, 1998
541998
A new correlation frequency analysis of the side channel
E Mateos, CH Gebotys
Proceedings of the 5th Workshop on Embedded Systems Security, 1-8, 2010
452010
The system can't perform the operation now. Try again later.
Articles 1–20