Skip to main content

and
  1. Article

    Open Access

    The ASHES 2021 special issue at JCEN

    This brief editorial gives a short, two-page overview of the ASHES 2021 workshop. It shall serve as an introduction for this special issue at JCEN.

    Chip-Hong Chang, Stefan Katzenbeisser in Journal of Cryptographic Engineering (2023)

  2. Article

    Open Access

    The ASHES 2020 special issue at JCEN

    This editorial provides its readers with a brief introductory overview of the ASHES workshop series in general, and of this special ASHES 2020 issue at the Journal of Cryptographic Engineering (JCEN) in partic...

    Chip-Hong Chang, Stefan Katzenbeisser in Journal of Cryptographic Engineering (2022)

  3. No Access

    Book and Conference Proceedings

    VLSI-SoC: Technology Advancement on SoC Design

    29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, Singapore, October 4–8, 2021, Revised and Extended Selected Papers

    Victor Grimblatt, Chip Hong Chang in IFIP Advances in Information and Communication Technology (2022)

  4. Article

    Open Access

    The ASHES 2019 special issue at JCEN

    This brief editorial gives a short, two-page overview of the ASHES 2019 workshop. It shall serve as an introduction for this special issue at JCEN.

    Chip-Hong Chang, Daniel E. Holcomb, Ulrich Rührmair in Journal of Cryptographic Engineering (2021)

  5. Article

    Open Access

    A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm **linx FPGAs

    Lightweight implementation of security primitives, e.g., physical unclonable functions (PUFs) and true random number generator, in field programmable gate array (FPGA) is crucial replacement of the conventiona...

    Chongyan Gu, Chip-Hong Chang, Weiqiang Liu in Journal of Cryptographic Engineering (2021)

  6. Article

    Open Access

    Halide perovskite memristors as flexible and reconfigurable physical unclonable functions

    Physical Unclonable Functions (PUFs) address the inherent limitations of conventional hardware security solutions in edge-computing devices. Despite impressive demonstrations with silicon circuits and crossbar...

    Rohit Abraham John, Nimesh Shah, Sujaya Kumar Vishwanath, Si En Ng in Nature Communications (2021)

  7. No Access

    Book

  8. No Access

    Book

  9. No Access

    Chapter

    Fault-Tolerant Computing in Redundant Residue Number System

    The semiconductor industry is aggressively gearing towards device node miniaturization to accommodate the unceasing demands for low power and high speed computing. This inexorable trend of device scaling escal...

    Thian Fatt Tay, Chip-Hong Chang in Embedded Systems Design with Special Arith… (2017)

  10. No Access

    Chapter

    Design and Evaluation of Booth-Encoded Multipliers in Redundant Binary Representation

    Redundant binary (RB) representation possesses some figures of merit as an internal format for the design of datapath components due to its carry-free property and avoidance of sign extension. Being a non-clas...

    Yajuan He, Jiaxing Yang, Chip-Hong Chang in Embedded Systems Design with Special Arith… (2017)

  11. No Access

    Chapter

    Double-Base Number System and Its Application in FIR Filter Design

    The electronic industry has witnessed a phenomenal growth over the last two decades, mainly due to the rapid advancement of very-large-scale integration technology. The number of integrated circuits has been r...

    Jiajia Chen, Chip-Hong Chang in Embedded Systems Design with Special Arith… (2017)

  12. No Access

    Book

  13. No Access

    Chapter

    Hardware IP Watermarking and Fingerprinting

    The continuously increasing gap between silicon and designer productivity has created a need for common design reuse. The initial response to this need emphasized the enforcement of designers’ rights through t...

    Chip-Hong Chang, Miodrag Potkonjak in Secure System Design and Trustable Computing (2016)

  14. No Access

    Chapter

    Secure Licensing of IP Cores on SRAM-Based FPGAs

    The rapid increase in FPGA devices’ capacity has enabled the implementation of complete sophisticated systems. The widening design productivity gap and shrinking time-to-market window have made licensing of ex...

    Li Zhang, Chip-Hong Chang in Secure System Design and Trustable Computing (2016)

  15. No Access

    Chapter

    Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-Oriented Cryptography

    Physical Unclonable Functions have emerged as effective primitives for varieties of security applications. With the advent of mobile computing, designing and implementing high-quality PUFs for resource-constra...

    Siarhei S. Zalivaka, Le Zhang in Secure System Design and Trustable Computi… (2016)

  16. No Access

    Chapter

    Self Organizing Feature Map for Color Quantization on FPGA

    This chapter presents an efficient architecture of Kohonen Self-Organizing Feature Map (SOFM) based on a new Frequency Adaptive Learning (FAL) algorithm which efficiently replaces the neighborhood adaptation f...

    Chip-Hong Chang, Menon Shibu, Rui **ao in FPGA Implementations of Neural Networks (2006)

  17. No Access

    Book and Conference Proceedings

    Advances in Computer Systems Architecture

    10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005. Proceedings

    Thambipillai Srikanthan, **gling Xue in Lecture Notes in Computer Science (2005)

  18. No Access

    Chapter and Conference Paper

    VLSI Performance Evaluation and Analysis of Systolic and Semisystolic Finite Field Multipliers

    Finite field multiplication in GF(2 m ) is an ineluctable operation in elliptic curve cryptography. The objective of this paper is to survey fast and efficient hardware implement...

    Ravi Kumar Satzoda, Chip-Hong Chang in Advances in Computer Systems Architecture (2005)

  19. No Access

    Article

    Properties and calculation of Paired Haar transform

    Different properties of recently introduced Paired Haar transform have been shown. Nonpolynomial Haar Pxpansion of incompletely specified Boolean functions has been presented. Based on the above properties and...

    Bogdan J. Falkowski, Chip-Hong Chang in Approximation Theory and its Applications (1999)