Abstract is missing.
- LLP-ECCA: A Low-Latency and Programmable Framework for Elliptic Curve Cryptography AcceleratorsYicheng Huang, Xueyan Wang, Tianao Dai, Jianlei Yang 0001, Zhaojun Lu, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao. 1-6 [doi]
- On Accuracy Enhancement of No-Reference Error-Tolerability Testing for Images in Object Detection Applications Based on RGB Channel CharacteristicsJun-Tsung Wu, Hideyuki Ichihara, Tomoo Inoue, Tong-Yu Hsieh. 1-6 [doi]
- Thermal-Aware Test Frequency OptimizationWei-Shen Wang, Zhe-Jia Liang, James Chien-Mo Li, Norman Chang, Akhilesh Kumar, Ying Shiun Li. 1-5 [doi]
- A Brief Survey on Randomizer Design and Optimization for Efficient Stochastic ComputingKuncai Zhong, Jiangyuan Wang, Lu Chen, Peng Wang, Zixuan You, Yuan Zhang, Jiliang Zhang. 1-6 [doi]
- A Dynamic Weight Quantization-Based Fault-tolerant Training Method for Ternary Memristive Neural NetworksZhiwei Zhong, Zhiqiang You, Peng Liu. 1-6 [doi]
- A Fast Method for Constructing Phase Shifters to Reduce Wiring ConflictsMin Jin, Can Xiang, Dong Xiang. 1-6 [doi]
- ICLTR: A Input-split Inverters and C-elements based Low-Cost Latch with Triple-Node-Upset RecoveryJiajia Zhang, Zhenmin Li, Gaoyang Shan, Jie Song, Xing Guo, Xiaoqing Wen. 1-6 [doi]
- A Scan Slice Reordering Algorithm Based on Minimizing Entropy to Enhance Test Data Compression EfficiencyMinghe Zhang, Guanglun Huang, Guoliang Ji, Zhiqiang You, Qiang Wu, Jianyu Cao. 1-6 [doi]
- CA4TJ: Correlational Analysis for Always-On Information-Leakage Hardware Trojan DetectingXing Hu, Yang Zhang, Zhenghao Li, Shaoqing Li. 1-6 [doi]
- Design of Ultra-High Throughput and Resource Efficiency TRNG Based on NAND-XOR and Feedback XOR Ring OscillatorsJunjun Wang, Zhao Huang, Hongxu Gao, Jia Zhou, Quan Wang. 1-6 [doi]
- CRISP: Triangle Counting Acceleration via Content Addressable Memory-Integrated 3D-Stacked MemoryShangtong Zhang, Xueyan Wang, Weisheng Zhao, Yier Jin. 1-6 [doi]
- Advanced DFT Clock Control Architectures with Agile Development for Chisel-Based High Performance RISC-V ProcessorsQi Zhao, Huibin Tao, Zhiheng He, Ruining Feng. 1-6 [doi]
- Accurate Hardware Trojan Detection Technology Based on Node Concealment FeaturesZhen Wang, Dan Jiang, Jingru Li, Shuhang Zheng. 1-6 [doi]
- A RO-Integrated-LFSR-Based Nonlinear Strong PUF with Intrinsic Modeling Attacks ResilienceJingchang Bian, Zhengfeng Huang, Ruixiang Liu, Yankun Lin, Zhao Yang, Huaguo Liang, Aibin Yan. 1-6 [doi]
- Timing-violation-soft PUF design based on carry-lookahead adderPengjun Wang, Ziyang Zheng, Gang Li. 1-6 [doi]
- Load balancing-oriented fault-tolerant NoC designTa Tan, Xiaowen Chen, Chen Li, Jianzhuang Lu. 1-6 [doi]
- A Survey on FPGA-based Accelerators for CKKSWenpeng Zhao, Qidong Chen, Yijie Wang, Haichun Zhang, Zhaojun Lu, Gang Qu 0001. 1-6 [doi]
- DFT for Complex Designs and Test Data ManagementWu Yang, Jinshan Yu, Pearl He, Xijiang Lin. 1 [doi]
- Detecting Stimuli with Novel Temporal Patterns to Accelerate Functional Coverage ClosureXuan Zheng, Tim Blackmore, James Buckingham, Kerstin Eder. 1-6 [doi]
- PFO PUF: A Lightweight Parallel Feed Obfuscation PUF Resistant to Machine Learning AttacksZhengfeng Huang, Yankun Lin, Fansheng Zeng, Jingchang Bian, Zhao Yang, Huaguo Liang, Yingchun Lu, Liang Yao, Xiaoqing Wen, Tianming Ni. 1-6 [doi]
- Efficient Functional Safety Method for Gate-Level Fine-Grained Digital Circuits with ISO-26262Mingjun Wang, Hui Wang, Jianan Mu, Zizhen Liu, Jun Gao, Jing Ye 0001, Huawei Li 0001, Xiaowei Li 0001. 1-6 [doi]
- A High Performance PODEM Algorithm with the Improved Backtrace ProcessYang Zeng, Xiaole Cui. 1-6 [doi]
- Multi-Stage Jitter-Reduction and Frequency Multiplication for 54 GHz ATE ClocksDavid C. Keezer, Dany Minier. 1-6 [doi]
- AI Driven TestingYu Huang, Alex Yu, Louis Liu, Xijiang Lin. 1 [doi]
- Test Point Selection for Multi-Cycle Logic BIST using Multivariate Temporal-Spatial GCNsSenling Wang, Shaoqi Wei, Hisashi Okamoto, Tatusya Nishikawa, Hiroshi Kai, Yoshinobu Higami, Hiroyuki Yotsuyanagi, Ruijun Ma, Tianming Ni, Hiroshi Takahashi, Xiaoqing Wen. 1-6 [doi]
- Pinpointing Hardware Trojans Through Semantic Feature Extraction and Natural Language ProcessingYichen Li, Wei Hu, Hao Su, Xuelin Zhang, Yizhi Zhao, Pengjun Wang, Lingjuan Wu. 1-6 [doi]
- NoBALL: A Novel BDD-based Attack against Logic LockingPraveen Karmakar, Anmoldeep Singh, Kartik Sharma, Chandan Karfa, Sukanta Bhattacharjee. 1-6 [doi]
- Towards Fault-tolerant Design of Quaternary Quantum ArithmeticYunchen Zhu, Ruixuan Yang, Yuhang Gu, Fangtian Gu, Lingyi Kong, He Li. 1-6 [doi]
- Trustworthy Codesign by Verifiable TransformationsQianzhou Wang, Zhiqiang Que, Wayne Luk. 1-6 [doi]
- Understanding and Mitigating the Soft Error of Contrastive Language-Image Pre-training ModelsYihao Shi, Bo Wang, Shengbai Luo, Qingshan Xue, Xueyi Zhang, Sheng Ma. 1-6 [doi]
- A Hardware Security Evaluation Platform on RISC-V SoCXiaolong Cheng, Aijiao Cui, Yier Jin. 1-6 [doi]
- CraftRGP: A Comprehensive Reliability Analysis Framework Towards ReRAM-Based Graph ProcessingXiaohui Wei 0002, Jiaguo Deng, Xiaonan Wang, Zongdian Li, Nan Jiang, Hengshan Yue. 1-6 [doi]
- FOSA: A Highly Fault-Tolerant Operating System ArchitectureQiao Peng, Xiaoguo Wan, Jiliang Zhang. 1-6 [doi]
- SHRCO: Design of an SRAM with High Reliability and Cost Optimization for Safety-Critical ApplicationsYang Chang, Guangzhu Liu, Inam Ullah, Gaoyang Shan, Xiaoqing Wen, Aibin Yan. 1-6 [doi]
- A Complementary Resistive Switch-Based Balanced Ternary LogicZhijian Peng, Peng Liu, Lian Yao, Zhiqiang You, Bosheng Liu, Yang Yi, Jigang Wu. 1-6 [doi]
- A DRAM Chip Protection Method Against EMFI Based on PHOTON HashLongtao Guo, Qiang Liu 0011. 1-6 [doi]
- Multiple-Error Interceptive Voter Designs for Safety-Critical ApplicationsXuehua Li, Jie Song, Chunjiong Zhang, Yuting He, Xiaoqing Wen, Zhengfeng Huang. 1-6 [doi]
- A Static Test Compaction Method Based on GCN Assisted Fault Gate ClassificationZhiteng Chao, Qinluan Dai, Jiale Li, Zizhen Liu, Wenxing Li, Hongqin Lyu, Jing Ye 0001, Huawei Li 0001, Xiaowei Li 0001. 1-6 [doi]
- Sideway Scan, Solving the Achilles' Heel of Scan-based DiagnosisLiyang Lai, Zefan Lin, Qitao Wang. 1-6 [doi]
- A Physical Unclonable Function Feature Extraction Technique for Oil Paintings Copyright ProtectionChengjie Wang, Yuejun Zhang, Shengjie Fu, Lixun Wang. 1-6 [doi]
- A Low-Energy Critical Charge-Enhanced SRAM for Aerospace ApplicationsNa Bai, Weihao Zhao, Yaohua Xu, Yi Wang. 1-6 [doi]
- A radiation-hardened 20T SRAM Cell with high reliability and low power consumptionShuo Cai, Xinjie Liang, Yan Wen, Fei Yu 0009, Lairong Yin. 1-6 [doi]
- ELSeM: An Efficient and Lightweight Security Mechanism for DSPYijing Peng, Yang Zhang, Qijin Zhu, Yang Guo, Xiaowen Chen. 1-6 [doi]
- SCD-PUF: Shuffled Chaotic-dual-PUF With High Machine Learning Attack ResilienceYijing Peng, Ding Deng, Zhenyu Wang, Yang Guo. 1-6 [doi]
- CQCTL: A Cost-Optimized and Quadruple-Node-Upset Completely Tolerant Latch Design for Safety-Critical ApplicationsZhen Shen, Qingyang Zhang, Byeong-hee Roh, Jie Song, Xiaoqing Wen. 1-6 [doi]
- MPC-PAT: A Pipeline Architecture for Beaver Triple Generation in Secure Multi-party ComputationXiaolin Li, Wei Yan, Hongwei Liu, Yong Zhang, Qinfen Hao, Yong Liu, Ninghui Sun. 1-6 [doi]
- Enhancing Subthreshold Stuck-at Fault Testing with Polymorphic GatesTimothy Dunlap, Gang Qu 0001. 1-6 [doi]
- SRBML: A Single-Event-Upset Recoverable and BTI-Mitigated Latch Design for Long-Term Reliability EnhancementFan Xia, Jing Zhang, Jehad Ali, Chunjiong Zhang, Xiaoqing Wen, Aibin Yan. 1-5 [doi]