Zhang Z, Yu Q.
Towards Energy-Efficient and Secure Computing Systems. Journal of Low Power Electronics and Applications [Internet]. 2018;8 (48) :1-15.
Publisher's VersionAbstract
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.
jlpea-08-00048.pdf Zhang Z, Yu Q.
A Survey on Energy Efficiency Techniques for Secure Computing Systems. The 9th international green and sustainable computing conference. 2018.
Dofe J, Yu Q.
Exploiting PDN Noise to Thwart Correlation Power Analysis Attacks in 3D ICs, in
Proceedings of the 20th System Level Interconnect Prediction Workshop. New York, NY, USA: ACM ; 2018 :6:1–6:6.
Publisher's Version Yan C, Dofe J, Kontak S, Yu Q, Salman E.
Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs. IEEE Transactions on Circuits and Systems II: Express Briefs. 2018;65 (6) :799-803.
Yuejun Z, Dailu D, Zhao P, Pengjun W, Qiaoyan Y.
An ultra-low power multiplier using multi-valued adiabatic logic in 65 nm CMOS process. Microelectronics Journal. 2018;78 :26-34.
Dofe J, Yu Q.
Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation. Trans. Comp.-Aided Des. Integ. Cir. Sys. [Internet]. 2018;37 (2) :273–285.
Publisher's Version