Fault-tolerant design E Dubrova Springer, 2013 | 506* | 2013 |
Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things Z Pang, L Zheng, J Tian, S Kao-Walter, E Dubrova, Q Chen Enterprise Information Systems 9 (1), 86-116, 2015 | 311 | 2015 |
A SAT-based algorithm for finding attractors in synchronous Boolean networks E Dubrova, M Teslenko IEEE/ACM transactions on computational biology and bioinformatics 8 (5 …, 2011 | 250 | 2011 |
Logic synthesis and verification S Hassoun, T Sasao Springer Science & Business Media, 2012 | 227* | 2012 |
Multiple-valued logic in vlsi: Challenges and opportunities E Dubrova Proceedings of NORCHIP 99, 340-350, 1999 | 172 | 1999 |
Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things Z Pang, Q Chen, J Tian, L Zheng, E Dubrova 2013 15th international conference on advanced communications technology …, 2013 | 132 | 2013 |
A side-channel attack on a masked IND-CCA secure saber KEM implementation K Ngo, E Dubrova, Q Guo, T Johansson IACR Transactions on Cryptographic Hardware and Embedded Systems, 676-707, 2021 | 113 | 2021 |
A transformation from the Fibonacci to the Galois NLFSRs E Dubrova Information Theory, IEEE Transactions on 55 (11), 5263-5271, 2009 | 109 | 2009 |
Fault tolerant design: An introduction E Dubrova Department of Microelectronics and Information Technology, Royal Institute …, 2008 | 107 | 2008 |
Espresso: A Stream Cipher for 5G Wireless Communication Systems E Dubrova, M Hell Cryptology ePrint Archive, 2015 | 96 | 2015 |
A list of maximum-period NLFSRs E Dubrova | 86 | 2012 |
Protecting IMSI and user privacy in 5G networks K Norrman, M Näslund, E Dubrova Proceedings of the 9th EAI international conference on mobile multimedia …, 2016 | 80 | 2016 |
Breaking a fifth-order masked implementation of crystals-kyber by copy-paste E Dubrova, K Ngo, J Gärtner, R Wang Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 10-20, 2023 | 79 | 2023 |
A Scalable Method for Constructing Galois NLFSRs With Period Using Cross-Join Pairs E Dubrova IEEE Transactions on Information Theory 59 (1), 703-709, 2012 | 78 | 2012 |
On analysis and synthesis of (n, k)-non-linear feedback shift registers E Dubrova, M Teslenko, H Tenhunen Proceedings of the conference on Design, automation and test in Europe, 1286 …, 2008 | 76 | 2008 |
Ring oscillator physical unclonable function with multi level supply voltages SS Mansouri, E Dubrova 2012 IEEE 30th International Conference on Computer Design (ICCD), 520-521, 2012 | 64 | 2012 |
Kauffman networks: Analysis and applications E Dubrova, M Teslenko, A Martinelli ICCAD-2005. IEEE/ACM International Conference on Computer-Aided Design, 2005 …, 2005 | 60 | 2005 |
Far field EM side-channel attack on AES using deep learning R Wang, H Wang, E Dubrova Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020 | 59 | 2020 |
How diversity affects deep-learning side-channel attacks H Wang, M Brisfors, S Forsmark, E Dubrova 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and …, 2019 | 59 | 2019 |
Tandem deep learning side-channel attack on FPGA implementation of AES H Wang, E Dubrova SN Computer Science 2 (5), 373, 2021 | 57 | 2021 |