default search action
Osnat Keren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Gilad Dar, Shlomo Engelberg, Osnat Keren:
On Codes for Detecting Address and Data Manipulations in Memory Arrays. IEEE Trans. Inf. Theory 70(8): 5544-5551 (2024) - [c36]Shlomo Engelberg, Osnat Keren:
Hardening Bus-Encoders with Power-Aware Single Error Correcting Codes. ETS 2024: 1-4 - [c35]Anton Maidl, Maël Gay, Osnat Keren, Ilia Polian:
Refinement and Empirical Side-Channel Analysis of Inner Product Masking with Robust Error Detection. IOLTS 2024: 1-7 - [i4]Itamar Levi, Osnat Keren:
Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost. IACR Cryptol. ePrint Arch. 2024: 967 (2024) - [i3]Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, Yury Kreimer:
STORM - Small Table Oriented Redundancy-based SCA Mitigation for AES. IACR Cryptol. ePrint Arch. 2024: 1187 (2024) - 2023
- [j39]David Zooker, Yoav Weizman, Alexander Fish, Osnat Keren:
Silicon Proven 1.29 μm × 1.8 μm 65nm Sub-Vt Optical Sensor for Hardware Security Applications. IEEE Access 11: 136269-136278 (2023) - 2022
- [j38]Gilad Dar, Giorgio Di Natale, Osnat Keren:
Nonlinear Code-Based Low-Overhead Fine-Grained Control Flow Checking. IEEE Trans. Computers 71(3): 658-669 (2022) - 2021
- [j37]Yoav Weizman, Robert Giterman, Oron Chertkow, Maoz Wicentowski, Itamar Levi, Ilan Sever, Ishai Kehati, Osnat Keren, Alexander Fish:
Low-Cost Side-Channel Secure Standard 6T-SRAM-Based Memory With a 1% Area and Less Than 5% Latency and Power Overheads. IEEE Access 9: 91764-91776 (2021) - [j36]Osnat Keren, Ilia Polian:
IPM-RED: combining higher-order masking with robust error detection. J. Cryptogr. Eng. 11(2): 147-160 (2021) - [j35]Yaara Neumeier, Osnat Keren:
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes. IEEE Trans. Dependable Secur. Comput. 18(2): 936-948 (2021) - [c34]Osnat Keren, Ilia Polian:
On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis. CF 2021: 229-237 - [c33]Gilad Dar, Avihay Grigiac, David Peled, Yagel Ashkenazi, Menachem Goldzweig, Yoav Weizman, Osnat Keren:
Compact Protection Codes for protecting memory from malicious data and address manipulations. ETS 2021: 1-6 - 2020
- [j34]Yizhak Shifman, Avi Miller, Osnat Keren, Yoav Weizman, Joseph Shor:
A Method to Utilize Mismatch Size to Produce an Additional Stable Bit in a Tilting SRAM-Based PUF. IEEE Access 8: 219137-219150 (2020) - [j33]Mael Gay, Batya Karp, Osnat Keren, Ilia Polian:
Error control scheme for malicious and natural faults in cryptographic modules. J. Cryptogr. Eng. 10(4): 321-336 (2020) - [j32]Yaara Neumeier, Osnat Keren:
On the Existence of Security Enhancing Converter Designs for Multi-Level Memories. IEEE Trans. Circuits Syst. II Express Briefs 67-II(6): 1119-1123 (2020) - [j31]Yizhak Shifman, Avi Miller, Osnat Keren, Yoav Weizman, Joseph Shor:
An SRAM-Based PUF With a Capacitive Digital Preselection for a 1E-9 Key Error Probability. IEEE Trans. Circuits Syst. 67-I(12): 4855-4868 (2020) - [j30]Shlomo Engelberg, Osnat Keren:
Constructive Bounds on the Capacity of Parallel Asynchronous Skew-Free Channels With Glitches. IEEE Trans. Inf. Theory 66(7): 4026-4037 (2020) - [c32]Giorgio Di Natale, Osnat Keren:
Nonlinear Codes for Control Flow Checking. ETS 2020: 1-6 - [c31]David Zooker Zabib, Matan Elkoni, Or Ohev Shalom, Yoav Weizman, Itamar Levi, Osnat Keren, Alexander Fish:
Temporal Power Redistribution as a Countermeasure against Side-Channel Attacks. ISCAS 2020: 1-5
2010 – 2019
- 2019
- [j29]Hila Rabii, Osnat Keren:
A new class of security oriented error correcting robust codes. Cryptogr. Commun. 11(5): 965-978 (2019) - [j28]Mael Gay, Batya Karp, Osnat Keren, Ilia Polian:
Toward Error-Correcting Architectures for Cryptographic Circuits Based on Rabii-Keren Codes. IEEE Embed. Syst. Lett. 11(4): 115-118 (2019) - [j27]Robert Giterman, Osnat Keren, Alexander Fish:
A 7T Security Oriented SRAM Bitcell. IEEE Trans. Circuits Syst. II Express Briefs 66-II(8): 1396-1400 (2019) - [j26]David Zooker Zabib, Moshe Avital, Yoav Weizman, Alexander Fish, Osnat Keren:
Silicon Proven 1.8 µm × 9.2 µm 65-nm Digital Bit Generator for Hardware Security Applications. IEEE Trans. Circuits Syst. II Express Briefs 66-II(10): 1713-1717 (2019) - [j25]Hila Rabii, Yaara Neumeier, Osnat Keren:
High Rate Robust Codes with Low Implementation Complexity. IEEE Trans. Dependable Secur. Comput. 16(3): 511-520 (2019) - [c30]Avi Miller, Yizhak Shifman, Yoav Weizman, Osnat Keren, Joseph Shor:
A Highly Reliable SRAM PUF with a Capacitive Preselection Mechanism and pre-ECC BER of 7.4E-10. CICC 2019: 1-4 - [c29]Robert Giterman, Maoz Wicentowski, Oron Chertkow, Ilan Sever, Ishai Kehati, Yoav Weizman, Osnat Keren, Alexander Fish:
Power Analysis Resilient SRAM Design Implemented with a 1% Area Overhead Impedance Randomization Unit for Security Applications. ESSCIRC 2019: 69-72 - [c28]Batya Karp, Ofer Amrani, Osnat Keren:
Nonlinear Product Codes for Reliability and Security. IVSW 2019: 13-18 - [c27]Honorio Martín, Elena Ioana Vatajelu, Giorgio Di Natale, Osnat Keren:
On the Reliability of the Ring Oscillator Physically Unclonable Functions. IVSW 2019: 25-30 - [c26]Yehuda Rudin, Itamar Levi, Alexander Fish, Osnat Keren:
FPGA Implementation of pAsynch Design Paradigm. NTMS 2019: 1-5 - [c25]David Zooker Zabib, Alexander Fish, Osnat Keren, Yoav Weizman:
Compact Sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security Applications. NTMS 2019: 1-5 - [c24]Osnat Keren, Ilia Polian:
A comment on information leakage from robust code-based checkers detecting fault attacks on cryptographic primitives. PROOFS 2019: 49-63 - 2018
- [j24]Itamar Levi, Alexander Fish, Osnat Keren:
Low-Cost Pseudoasynchronous Circuit Design Style With Reduced Exploitable Side Information. IEEE Trans. Very Large Scale Integr. Syst. 26(1): 82-95 (2018) - [j23]Robert Giterman, Maoz Vicentowski, Itamar Levi, Yoav Weizman, Osnat Keren, Alexander Fish:
Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell. IEEE Trans. Very Large Scale Integr. Syst. 26(10): 2180-2184 (2018) - [c23]Moshe Avital, Anatoli Mordakhay, David Zooker Zabib, Yoav Weizman, Alexander Fish, Osnat Keren:
Utilization of Process and Supply Voltage Random Variations for Random Bit Generation. APCCAS 2018: 317-320 - [c22]Batya Karp, Maël Gay, Osnat Keren, Ilia Polian:
Detection and Correction of Malicious and Natural Faults in Cryptographic Modules. PROOFS 2018: 68-82 - [c21]Itamar Levi, Yehuda Rudin, Alexander Fish, Osnat Keren:
Embedded randomness and data dependencies design paradigm: Advantages and challenges. DATE 2018: 395-400 - [c20]Batya Karp, Mael Gay, Osnat Keren, Ilia Polian:
Security-oriented Code-based Architectures for Mitigating Fault Attacks. DCIS 2018: 1-6 - 2017
- [j22]Itamar Levi, Netanel Miller, Elad Avni, Osnat Keren, Alexander Fish:
A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits. IEEE Access 5: 24797-24809 (2017) - [j21]Shlomo Engelberg, Osnat Keren:
Reliable Communications Across Parallel Asynchronous Channels With Arbitrary Skews. IEEE Trans. Inf. Theory 63(2): 1120-1129 (2017) - [j20]Itamar Levi, Alexander Fish, Osnat Keren:
CPA Secured Data-Dependent Delay-Assignment Methodology. IEEE Trans. Very Large Scale Integr. Syst. 25(2): 608-620 (2017) - [c19]David Zooker Zabib, Maoz Vizentovski, Alexander Fish, Osnat Keren, Yoav Weizman:
Vulnerability of secured IoT memory against localized back side laser fault injection. EST 2017: 7-11 - [c18]Shlomo Engelberg, Osnat Keren:
Reliable Communication Across Parallel Asynchronous Channels with Glitches. ICMCTA 2017: 93-106 - [c17]Hila Rabii, Osnat Keren:
A New Construction of Minimum Distance Robust Codes. ICMCTA 2017: 272-282 - [c16]Batya Karp, Yerucham Berkowitz, Osnat Keren:
Jamming resistant encoding for non-uniformly distributed information. IOLTS 2017: 169-173 - 2016
- [j19]Moshe Avital, Itamar Levi, Osnat Keren, Alexander Fish:
CMOS Based Gates for Blurring Power Information. IEEE Trans. Circuits Syst. I Regul. Pap. 63-I(7): 1033-1042 (2016) - [i2]Osnat Keren, Ilia Polian, Mark M. Tehranipoor:
Hardware Security (Dagstuhl Seminar 16202). Dagstuhl Reports 6(5): 72-93 (2016) - 2015
- [j18]Annabel Sharon Shitrit, Yonathan Murin, Ron Dabora, Osnat Keren:
A New Approach to UEP-HARQ via Convolutional Codes. IEEE Commun. Lett. 19(12): 2062-2065 (2015) - [j17]Moshe Avital, Hadar Dagan, Itamar Levi, Osnat Keren, Alexander Fish:
DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes. IEEE Trans. Circuits Syst. I Regul. Pap. 62-I(1): 149-156 (2015) - [j16]Itamar Levi, Osnat Keren, Alexander Fish:
Data-Dependent Delays as a Barrier Against Power Attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 62-I(8): 2069-2078 (2015) - [j15]Yaara Neumeier, Y. Pesso, Osnat Keren:
Efficient Implementation of Punctured Parallel Finite Field Multipliers. IEEE Trans. Circuits Syst. I Regul. Pap. 62-I(9): 2260-2267 (2015) - [j14]Osnat Keren, Mark G. Karpovsky:
Relations Between the Entropy of a Source and the Error Masking Probability for Security-Oriented Codes. IEEE Trans. Commun. 63(1): 206-214 (2015) - [j13]Moshe Avital, Hadar Dagan, Osnat Keren, Alexander Fish:
Randomized Multitopology Logic Against Differential Power Analysis. IEEE Trans. Very Large Scale Integr. Syst. 23(4): 702-711 (2015) - [c15]Shlomo Engelberg, Osnat Keren:
Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skews. ITW 2015: 1-4 - [i1]Annabel Sharon Shitrit, Yonathan Murin, Ron Dabora, Osnat Keren:
A New Approach to UEP-HARQ via Convolutional Codes. CoRR abs/1509.08520 (2015) - 2014
- [j12]Ariel Burg, Osnat Keren:
Universal Hardware for Systems With Acceptable Representations as Low Order Polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(10): 2878-2887 (2014) - [j11]Yaara Neumeier, Osnat Keren:
Robust Generalized Punctured Cubic Codes. IEEE Trans. Inf. Theory 60(5): 2813-2822 (2014) - [c14]Victor Tomashevich, Yaara Neumeier, Raghavan Kumar, Osnat Keren, Ilia Polian:
Protecting cryptographic hardware against malicious attacks by nonlinear robust codes. DFT 2014: 40-45 - [c13]Yaara Neumeier, Osnat Keren:
A new efficiency criterion for security oriented error correcting codes. ETS 2014: 1-6 - 2013
- [j10]Ariel Burg, Osnat Keren:
On the Efficiency of Berger Codes Against Error Injection Attacks on Parallel Asynchronous Communication Channels. Inf. Secur. J. A Glob. Perspect. 22(5-6): 208-215 (2013) - [j9]Igor Shumsky, Osnat Keren:
Enhancement of Hardware Security by Hamming-Ball Based State Assignment. Inf. Secur. J. A Glob. Perspect. 22(5-6): 216-225 (2013) - [j8]Shlomo Engelberg, Osnat Keren:
An Introduction to Robust Codes over Finite Fields. SIAM Rev. 55(4): 751-763 (2013) - 2012
- [c12]Yifat Manzor, Osnat Keren:
Amalgamated q-ary codes for multi-level flash memories. DFT 2012: 98-103 - [c11]Ariel Burg, Osnat Keren:
Functional level embedded self testing for Walsh transform based adaptive hardware. IOLTS 2012: 134-135 - [c10]Yaara Neumeier, Osnat Keren:
Punctured Karpovsky-Taubin binary robust error detecting codes for cryptographic devices. IOLTS 2012: 156-161 - 2011
- [j7]Osnat Keren, Ilya Levin, Radomir S. Stankovic:
Determining the Number of Paths in Decision Diagrams by Using Autocorrelation Coefficients. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 30(1): 31-44 (2011) - [j6]Shlomo Engelberg, Osnat Keren:
A Comment on the Karpovsky-Taubin Code. IEEE Trans. Inf. Theory 57(12): 8007-8010 (2011) - [c9]Ilya Levin, Osnat Keren:
Generalized If-Then-Else Operator for Compact Polynomial Representation of Multi Output Functions. DSD 2011: 15-20 - [c8]Osnat Keren, Ilya Levin, Vladimir Sinelnikov:
Detection of Trojan HW by using hidden information on the system. IOLTS 2011: 192-193 - 2010
- [j5]Osnat Keren:
One-to-Many: Context-Oriented Code for Concurrent Error Detection. J. Electron. Test. 26(3): 337-353 (2010) - [c7]Osnat Keren, Ilya Levin, Mark G. Karpovsky:
Duplication Based One-to-Many Coding for Trojan HW Detection. DFT 2010: 160-166 - [c6]Osnat Keren, Ilya Levin:
Fault tolerance of decomposed PLAs. EWDTS 2010: 86-91
2000 – 2009
- 2009
- [c5]Samary Baranov, Ilya Levin, Osnat Keren, Mark G. Karpovsky:
Designing fault tolerant FSM by nano-PLA. IOLTS 2009: 229-234 - 2008
- [j4]Osnat Keren:
Reduction of Average Path Length in Binary Decision Diagrams by Spectral Methods. IEEE Trans. Computers 57(4): 520-531 (2008) - [c4]Osnat Keren, Ilya Levin, Vladimir Ostrovsky, Beni Abramov:
Arbitrary Error Detection in Combinational Circuits by Using Partitioning. DFT 2008: 361-369 - 2007
- [c3]Osnat Keren, Ilya Levin, Radomir S. Stankovic:
Use of Gray Decoding for Implementation of Symmetric Functions. VLSI-SoC (Selected Papers) 2007: 1-16 - [c2]Osnat Keren, Ilya Levin, Radomir S. Stankovic:
Use of gray decoding for implementation of symmetric functions. VLSI-SoC 2007: 25-30 - 2006
- [c1]Ilya Levin, Vladimir Ostrovsky, Osnat Keren, Vladimir Sinelnikov:
Cascade Scheme for Concurrent Errors Detection. DSD 2006: 359-368
1990 – 1999
- 1999
- [j3]Osnat Keren, Simon Litsyn:
More on the Distance Distribution of BCH Codes. IEEE Trans. Inf. Theory 45(1): 251-255 (1999) - 1998
- [j2]Osnat Keren, Simon Litsyn:
Codes Correcting Phased Burst Erasures. IEEE Trans. Inf. Theory 44(1): 416-420 (1998) - 1997
- [j1]Osnat Keren, Simon Litsyn:
A class of array codes correcting multiple column erasures. IEEE Trans. Inf. Theory 43(6): 1843-1851 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint