Avinash L. Varna
Orcid: 0009-0009-4189-5860Affiliations:
- Intel Corporation, USA
According to our database1,
Avinash L. Varna
authored at least 37 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%-99.99% Error Coverage in Intel 4 CMOS.
IEEE J. Solid State Circuits, January, 2024
CoRR, 2024
A 65nm Delta-Sigma ADC Based VDD-Variation-Tolerant Power-Side-Channel-Attack Monitor with Detection Capability Down to 0.25Ω.
Proceedings of the IEEE Symposium on VLSI Technology and Circuits 2024, 2024
2023
Enhanced PATRON: Fault Injection and Power-aware FSM Encoding Through Linear Programming.
ACM Trans. Design Autom. Electr. Syst., November, 2023
IACR Cryptol. ePrint Arch., 2023
A 100Gbps Fault-Injection Attack Resistant AES-256 Engine with 99.1-to-99.99% Error Coverage in Intel 4 CMOS.
Proceedings of the IEEE International Solid- State Circuits Conference, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
2021
EM and Power SCA-Resilient AES-256 Through >350× Current-Domain Signature Attenuation and Local Lower Metal Routing.
IEEE J. Solid State Circuits, 2021
Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier.
IACR Cryptol. ePrint Arch., 2021
2020
27.3 EM and Power SCA-Resilient AES-256 in 65nm CMOS Through >350× Current-Domain Signature Attenuation.
Proceedings of the 2020 IEEE International Solid- State Circuits Conference, 2020
2014
Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization.
IEEE Access, 2014
2013
"Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing.
IEEE Trans. Inf. Forensics Secur., 2013
2012
An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2012
Modeling and analysis of Electric Network Frequency signal for timestamp verification.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
"Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the International Conference on Image Processing, 2010
Gradient descent approach for secure localization in resource constrained wireless sensor networks.
Proceedings of the IEEE International Conference on Acoustics, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Data hiding in hard-copy text documents robust to print, scan and photocopy operations.
Proceedings of the IEEE International Conference on Acoustics, 2009
Proceedings of the IEEE International Conference on Acoustics, 2009
2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
A decision theoretic framework for analyzing binary hash-based content identification systems.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
2007
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia.
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007