


default search action
N. Nalla Anandakumar
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c10]Upoma Das, M. Sazadur Rahman
, N. Nalla Anandakumar, Kimia Zamiri Azar, Fahim Rahman, Mark M. Tehranipoor, Farimah Farahmandi:
PSC-Watermark: Power Side Channel Based IP Watermarking Using Clock Gates. ETS 2023: 1-6 - 2022
- [j7]N. Nalla Anandakumar
, Mohammad S. Hashmi
, Muhammad Akmal Chaudhary
:
Implementation of Efficient XOR Arbiter PUF on FPGA With Enhanced Uniqueness and Security. IEEE Access 10: 129832-129842 (2022) - [j6]N. Nalla Anandakumar
, Mohammad S. Hashmi
, Somitra Kumar Sanadhya
:
Field Programmable Gate Array based elliptic curve Menezes-Qu-Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives. IET Circuits Devices Syst. 16(5): 382-398 (2022) - [j5]N. Nalla Anandakumar
, Mohammad S. Hashmi
, Somitra Kumar Sanadhya:
Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security. ACM J. Emerg. Technol. Comput. Syst. 18(4): 72:1-72:26 (2022) - [i4]N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor:
Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs. IACR Cryptol. ePrint Arch. 2022: 92 (2022) - [i3]Jungmin Park, N. Nalla Anandakumar, Dipayan Saha
, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms. IACR Cryptol. ePrint Arch. 2022: 527 (2022) - 2021
- [j4]N. Nalla Anandakumar
, Mohammad S. Hashmi
, Mark M. Tehranipoor:
FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures. Integr. 81: 175-194 (2021) - [c9]Gani Kumisbek
, N. Nalla Anandakumar, Mohammad S. Hashmi
:
FPGA Implementations of Espresso Stream Cipher. ICECS 2021: 1-6 - 2020
- [j3]N. Nalla Anandakumar
, Mohammad S. Hashmi
, Somitra Kumar Sanadhya
:
Efficient and Lightweight FPGA-based Hybrid PUFs with Improved Performance. Microprocess. Microsystems 77: 103180 (2020) - [j2]N. Nalla Anandakumar
, Somitra Kumar Sanadhya
, Mohammad S. Hashmi
:
FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings. IEEE Trans. Circuits Syst. II Express Briefs 67-II(3): 570-574 (2020) - [c8]R. Raja Adhithan, N. Nalla Anandakumar:
Modeling Attacks and Efficient Countermeasures on Interpose PUF. FPS 2020: 149-162 - [c7]Chintala Yehoshuva, R. Raja Adhithan, N. Nalla Anandakumar:
A Survey of Security Attacks on Silicon Based Weak PUF Architectures. SSCC 2020: 107-122 - [c6]N. Nalla Anandakumar, Somitra Kumar Sanadhya, Mohammad S. Hashmi
:
Design, Implementation and Analysis of Efficient Hardware-Based Security Primitives. VLSI-SOC 2020: 198-199
2010 – 2019
- 2018
- [j1]N. Nalla Anandakumar
, M. Prem Laxman Das
, Somitra Kumar Sanadhya
, Mohammad S. Hashmi
:
Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve. ACM Trans. Reconfigurable Technol. Syst. 11(2): 12:1-12:19 (2018) - [c5]Sivappriya Manivannan
, N. Nalla Anandakumar
, M. Nirmala Devi
:
Key Retrieval from AES Architecture Through Hardware Trojan Horse. SSCC 2018: 483-494 - 2017
- [c4]N. Nalla Anandakumar
, Mohammad S. Hashmi
, Somitra Kumar Sanadhya
:
Compact Implementations of FPGA-based PUFs with Enhanced Performance. VLSID 2017: 161-166 - 2015
- [c3]N. Nalla Anandakumar
:
SCA Resistance Analysis on FPGA Implementations of Sponge Based \mathttMAC-\mathttPHOTON. SECITC 2015: 69-86 - [i2]N. Nalla Anandakumar:
SCA Resistance Analysis of MAC-PHOTON. IACR Cryptol. ePrint Arch. 2015: 197 (2015) - 2014
- [c2]N. Nalla Anandakumar, Thomas Peyrin
, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. INDOCRYPT 2014: 304-321 - [i1]N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. IACR Cryptol. ePrint Arch. 2014: 738 (2014) - 2012
- [c1]N. Nalla Anandakumar
, S. Dillibabu:
Correlation power analysis attack of AES on FPGA using customized communication protocol. CCSEIT 2012: 683-688
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint