Chenglu Jin
Cited by
Cited by
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M van Dijk
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (4 …, 2019
Advancing the state-of-the-art in hardware trojans detection
SK Haider, C Jin, M Ahmad, D Shila, O Khan, M van Dijk
IEEE Transactions on Dependable and Secure Computing 16 (1), 18-32, 2017
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5 (3), 153-169, 2015
A survey of cybersecurity of digital manufacturing
P Mahesh, A Tiwari, C Jin, PR Kumar, ALN Reddy, STS Bukkapatanam, ...
Proceedings of the IEEE 109 (4), 495-516, 2020
Security of cloud FPGAs: A survey
C Jin, V Gohil, R Karri, J Rajendran
arXiv preprint arXiv:2005.04867, 2020
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk
Cryptography 1 (3), 23, 2017
Phase calibrated ring oscillator PUF design and implementation on FPGAs
W Yan, C Jin, F Tehranipoor, JA Chandy
2017 27th International Conference on Field Programmable Logic and …, 2017
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems
C Jin, S Valizadeh, M van Dijk
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 824-829, 2018
Advancing the state-of-the-art in hardware trojans design
SK Haider, C Jin, M van Dijk
2017 IEEE 60th International Midwest Symposium on Circuits and Systems …, 2017
Secure and efficient initialization and authentication protocols for SHIELD
C Jin, M van Dijk
IEEE Transactions on Dependable and Secure Computing 16 (1), 156-173, 2017
Efficient Erasable PUFs from Programmable Logic and Memristors.
Y Gao, C Jin, J Kim, H Nili, X Xu, WP Burleson, O Kavehei, M van Dijk, ...
IACR Cryptol. ePrint Arch. 2018, 358, 2018
Security Opportunities in Nano Devices and Emerging Technologies
M Tehranipoor, D Forte, GS Rose, S Bhunia
CRC Press, 2017
Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems
Z Yang, C Jin, Y Tian, J Lai, J Zhou
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
Programmable access-controlled and generic erasable PUF design and its applications
C Jin, W Burleson, M van Dijk, U Rührmair
Journal of Cryptographic Engineering 12 (4), 413-432, 2022
Proof of aliveness
C Jin, Z Yang, M van Dijk, J Zhou
Proceedings of the 35th Annual Computer Security Applications Conference, 1-16, 2019
New clone-detection approach for RFID-based supply chains
H Maleki, R Rahaeimehr, C Jin, M Van Dijk
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
HMACCE: establishing authenticated and confidential channel from historical data for industrial internet of things
C Jin, Z Yang, T Xiang, S Adepu, J Zhou
IEEE Transactions on Information Forensics and Security 18, 1080-1094, 2023
PLCrypto: A symmetric cryptographic library for programmable logic controllers
Z Yang, Z Bao, C Jin, Z Liu, J Zhou
IACR Transactions on Symmetric Cryptology, 170-217, 2021
Erasable pufs: formal treatment and generic design
C Jin, W Burleson, M van Dijk, U Rührmair
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20