Name
Affiliation
Papers
OSNAT KEREN
Bar-Ilan University, Ramat Gan, Israel
51
Collaborators
Citations 
PageRank 
58
106
20.19
Referers 
Referees 
References 
159
622
429
Search Limit
100622
Title
Citations
PageRank
Year
Nonlinear Code-Based Low-Overhead Fine-Grained Control Flow Checking00.342022
Compact Protection Codes for protecting memory from malicious data and address manipulations00.342021
On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis00.342021
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes00.342021
Constructive Bounds on the Capacity of Parallel Asynchronous Skew-Free Channels with Glitches00.342020
On the existence of security enhancing converter designs for multi-level memories00.342020
Nonlinear Codes for Control Flow Checking00.342020
Temporal Power Redistribution as a Countermeasure against Side-Channel Attacks00.342020
An SRAM-Based PUF With a Capacitive Digital Preselection for a 1E-9 Key Error Probability20.402020
High rate robust codes with low implementation complexity10.352019
Silicon Proven 1.8 µm × 9.2 µm 65-nm Digital Bit Generator for Hardware Security Applications.00.342019
A 7T Security Oriented SRAM Bitcell00.342019
Nonlinear Product Codes for Reliability and Security00.342019
Toward Error-Correcting Architectures for Cryptographic Circuits Based on Rabii–Keren Codes00.342019
On the Reliability of the Ring Oscillator Physically Unclonable Functions10.452019
Power Analysis Resilient SRAM Design Implemented with a 1% Area Overhead Impedance Randomization Unit for Security Applications00.342019
A new class of security oriented error correcting robust codes00.342019
Low-Cost Pseudoasynchronous Circuit Design Style With Reduced Exploitable Side Information.20.442018
Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell.10.412018
Utilization of Process and Supply Voltage Random Variations for Random Bit Generation00.342018
Embedded randomness and data dependencies design paradigm: Advantages and challenges00.342018
Detection and Correction of Malicious and Natural Faults in Cryptographic Modules.00.342018
CPA Secured Data-Dependent Delay-Assignment Methodology.20.372017
A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits.00.342017
Vulnerability of secured IoT memory against localized back side laser fault injection00.342017
Reliable Communications Across Parallel Asynchronous Channels With Arbitrary Skews.30.472017
CMOS Based Gates for Blurring Power Information.40.432016
Efficient Implementation of Punctured Parallel Finite Field Multipliers10.352015
DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes180.862015
Relations Between the Entropy of a Source and the Error Masking Probability for Security-Oriented Codes40.422015
A New Approach to UEP-HARQ via Convolutional Codes00.342015
Randomized Multitopology Logic Against Differential Power Analysis110.522015
Data-Dependent Delays as a Barrier Against Power Attacks110.582015
Universal Hardware for Systems With Acceptable Representations as Low Order Polynomials00.342014
A new efficiency criterion for security oriented error correcting codes20.382014
Protecting cryptographic hardware against malicious attacks by nonlinear robust codes90.502014
Robust Generalized Punctured Cubic Codes60.482014
Enhancement of Hardware Security by Hamming-Ball Based State Assignment20.382013
An Introduction to Robust Codes over Finite Fields10.352013
On the Efficiency of Berger Codes Against Error Injection Attacks on Parallel Asynchronous Communication Channels00.342013
Amalgamated q-ary codes for multi-level flash memories00.342012
Punctured Karpovsky-Taubin binary robust error detecting codes for cryptographic devices60.532012
Functional level embedded self testing for Walsh transform based adaptive hardware10.432012
Generalized If-Then-Else Operator for Compact Polynomial Representation of Multi Output Functions00.342011
Determining the Number of Paths in Decision Diagrams by Using Autocorrelation Coefficients30.542011
Duplication Based One-to-Many Coding for Trojan HW Detection00.342010
One-to-Many: Context-Oriented Code for Concurrent Error Detection10.372010
Arbitrary Error Detection in Combinational Circuits by Using Partitioning10.362008
Reduction of Average Path Length in Binary Decision Diagrams by Spectral Methods50.452008
Use Of Gray Decoding For Implementation Of Symmetric Functions50.462007
  • 1
  • 2