default search action
Leyla Nazhandali
Person information
- affiliation: Virginia Tech, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Mustahsin Chowdhury, Shaunak Manurkar, Varun Rege, Poonam Gupta, Arjun Sharma, Leyla Nazhandali, Masoud Agah:
Miniaturized Gas Chromatographic Nose for On-Site Adulteration Detection. IEEE Trans. Instrum. Meas. 72: 1-11 (2023) - 2020
- [j12]Surabhi Satyajit Gujar, Leyla Nazhandali:
Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors. J. Hardw. Syst. Secur. 4(3): 196-207 (2020) - [c33]Leyla Nazhandali, Desen Sevi Ozkan, David P. Reeping, Liesl Baum, Lisa D. McNair:
Skip the clicker: A narrative inquiry of a professor's 'Teaching Toolbox' for large class sizes. FIE 2020: 1-6 - [i2]Shashank Raghuraman, Leyla Nazhandali:
Impact of System-on-Chip Integration of AEAD Ciphers. IACR Cryptol. ePrint Arch. 2020: 279 (2020)
2010 – 2019
- 2019
- [j11]Bilgiday Yuce, Chinmay Deshpande, Marjan Ghodrati, Abhishek Bendre, Leyla Nazhandali, Patrick Schaumont:
A Secure Exception Mode for Fault-Attack-Resistant Processing. IEEE Trans. Dependable Secur. Comput. 16(3): 388-401 (2019) - 2018
- [c32]Marjan Ghodrati, Bilgiday Yuce, Surabhi Gujar, Chinmay Deshpande, Leyla Nazhandali, Patrick Schaumont:
Inducing local timing fault through EM injection. DAC 2018: 142:1-142:6 - 2017
- [j10]Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Harika Santapuri, Conor Patrick, Leyla Nazhandali, Patrick Schaumont:
Analyzing the Fault Injection Sensitivity of Secure Embedded Software. ACM Trans. Embed. Comput. Syst. 16(4): 95:1-95:25 (2017) - [c31]Chinmay Deshpande, Bilgiday Yuce, Leyla Nazhandali, Patrick Schaumont:
Employing dual-complementary flip-flops to detect EMFI attacks. AsianHOST 2017: 109-114 - 2016
- [c30]Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Conor Patrick, Leyla Nazhandali, Patrick Schaumont:
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response. HASP@ISCA 2016: 8:1-8:8 - [c29]Chinmay Deshpande, Bilgiday Yuce, Nahid Farhady Ghalaty, Dinesh Ganta, Patrick Schaumont, Leyla Nazhandali:
A Configurable and Lightweight Timing Monitor for Fault Attack Detection. ISVLSI 2016: 461-466 - 2015
- [j9]Meeta Srivastav, Mohammed Ehteshamuddin, Kyle Stegner, Leyla Nazhandali:
Design of Ultra-Low Power Scalable-Throughput Many-Core DSP Applications. ACM Trans. Design Autom. Electr. Syst. 20(3): 34:1-34:21 (2015) - [c28]Meeta Srivastav, Leyla Nazhandali:
Study of the impact of aging on many-core energy-efficient DSP systems. ISQED 2015: 66-70 - 2014
- [c27]Dinesh Ganta, Leyla Nazhandali:
Study of IC aging on ring oscillator physical unclonable functions. ISQED 2014: 461-466 - [c26]Dinesh Ganta, Leyla Nazhandali:
Circuit-level approach to improve the temperature reliability of Bi-stable PUFs. ISQED 2014: 467-472 - [c25]Mehrdad Khatir, Leyla Nazhandali:
Sense Amplifier Pass Transistor Logic for energy efficient and DPA-resistant AES circuit. ISQED 2014: 517-522 - 2013
- [j8]Meeta Srivastav, Xu Guo, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali, Patrick Schaumont:
Design and benchmarking of an ASIC with five SHA-3 finalist candidates. Microprocess. Microsystems 37(2): 246-257 (2013) - [j7]Michael B. Henry, Leyla Nazhandali:
NEMS-Based Functional Unit Power-Gating: Design, Analysis, and Optimization. IEEE Trans. Circuits Syst. I Regul. Pap. 60-I(2): 290-302 (2013) - [j6]Lalleh Rafeei, Michael B. Henry, Leyla Nazhandali:
Fast Approximation Framework for Timing and Power Analysis of Ultra-Low-Voltage Circuits. IEEE Trans. Circuits Syst. I Regul. Pap. 60-I(6): 1501-1510 (2013) - [c24]Avinash R. Desai, Michael S. Hsiao, Chao Wang, Leyla Nazhandali, T. Simin Hall:
Interlocking obfuscation for anti-tamper hardware. CSIIRW 2013: 8 - [c23]Rashmi Moudgil, Dinesh Ganta, Leyla Nazhandali, Michael S. Hsiao, Chao Wang, T. Simin Hall:
A novel statistical and circuit-based technique for counterfeit detection in existing ICs. ACM Great Lakes Symposium on VLSI 2013: 1-6 - [c22]Meeta Srivastav, Yongbo Zuo, Xu Guo, Leyla Nazhandali, Patrick Schaumont:
Study of ASIC technology impact factors on performance evaluation of SHA-3 candidates. ACM Great Lakes Symposium on VLSI 2013: 345-346 - [c21]Dinesh Ganta, Leyla Nazhandali:
Easy-to-build Arbiter Physical Unclonable Function with enhanced challenge/response set. ISQED 2013: 733-738 - 2012
- [j5]Michael B. Henry, Leyla Nazhandali:
From Transistors to NEMS: Highly Efficient Power-Gating of CMOS Circuits. ACM J. Emerg. Technol. Comput. Syst. 8(1): 2:1-2:18 (2012) - [j4]Meeta Srivastav, Michael B. Henry, Leyla Nazhandali:
Design of energy-efficient, adaptable throughput systems at near/sub-threshold voltage. ACM Trans. Design Autom. Electr. Syst. 18(1): 3:1-3:23 (2012) - [c20]Michael B. Henry, Leyla Nazhandali:
Design techniques for functional-unit power gating in the Ultra-Low-Voltage region. ASP-DAC 2012: 609-614 - [c19]Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali, Patrick Schaumont:
ASIC implementations of five SHA-3 finalists. DATE 2012: 1006-1011 - [c18]Meeta Srivastav, Leyla Nazhandali:
Design and analysis of multi-core homogeneous systems for energy harvesting applications. ICECS 2012: 532-535 - [c17]Meeta Srivastav, Michael B. Henry, Leyla Nazhandali:
Design of low-power, scalable-throughput systems at near/sub threshold voltage. ISQED 2012: 609-616 - 2011
- [j3]Michael B. Henry, Leyla Nazhandali:
Hybrid Super/Subthreshold Design of a Low Power Scalable-Throughput FFT Architecture. Trans. High Perform. Embed. Archit. Compil. 4: 175-194 (2011) - [c16]Michael B. Henry, Meeta Srivastav, Leyla Nazhandali:
A case for NEMS-based functional-unit power gating of low-power embedded microprocessors. DAC 2011: 872-877 - [c15]Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali, Patrick Schaumont:
Pre-silicon Characterization of NIST SHA-3 Final Round Candidates. DSD 2011: 535-542 - [c14]Dinesh Ganta, Vignesh Vivekraja, Kanu Priya, Leyla Nazhandali:
A Highly Stable Leakage-Based Silicon Physical Unclonable Functions. VLSI Design 2011: 135-140 - [c13]Vignesh Vivekraja, Leyla Nazhandali:
Feedback Based Supply Voltage Control for Temperature Variation Tolerant PUFs. VLSI Design 2011: 214-219 - [c12]Michael B. Henry, Robert Lyerly, Leyla Nazhandali, Adam Fruehling, Dimitrios Peroulis:
MEMS-Based Power Gating for Highly Scalable Periodic and Event-Driven Processing. VLSI Design 2011: 286-291 - 2010
- [c11]Michael B. Henry, Leyla Nazhandali:
From transistors to MEMS: Throughput-aware power gating in CMOS circuits. DATE 2010: 130-135 - [c10]Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh:
Prototyping Platform for Performance Evaluation of SHA-3 Candidates. HOST 2010: 60-63 - [p1]Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang:
From Statistics to Circuits: Foundations for Future Physical Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 55-78 - [i1]Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont:
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings. IACR Cryptol. ePrint Arch. 2010: 536 (2010)
2000 – 2009
- 2009
- [j2]Bo Zhai, Sanjay Pant, Leyla Nazhandali, Scott Hanson, Javin Olson, Anna Reeves, Michael Minuth, Ryan Helfand, Todd M. Austin, Dennis Sylvester, David T. Blaauw:
Energy-Efficient Subthreshold Processor Design. IEEE Trans. Very Large Scale Integr. Syst. 17(8): 1127-1137 (2009) - [c9]Michael B. Henry, Leyla Nazhandali:
Hybrid Super/Subthreshold Design of a Low Power Scalable-Throughput FFT Architecture. HiPEAC 2009: 278-292 - [c8]Vignesh Vivekraja, Leyla Nazhandali:
Circuit Level Techniques for Reliable Physically Uncloneable Functions. HOST 2009: 30-35 - [c7]Michael B. Henry, Steven B. Griffin, Leyla Nazhandali:
Fast Simulation Framework for Subthreshold Circuits. ISCAS 2009: 2549-2552 - 2008
- [j1]Scott Hanson, Bo Zhai, Mingoo Seok, Brian Cline, Kevin Zhou, Meghna Singhal, Michael Minuth, Javin Olson, Leyla Nazhandali, Todd M. Austin, Dennis Sylvester, David T. Blaauw:
Exploring Variability and Performance in a Sub-200-mV Processor. IEEE J. Solid State Circuits 43(4): 881-891 (2008) - [c6]Michael B. Henry, Syed Imtiaz Haider, Leyla Nazhandali:
A low-power parallel design of discrete wavelet transform using subthreshold voltage technology. CASES 2008: 235-244 - [c5]Syed Imtiaz Haider, Leyla Nazhandali:
Utilizing sub-threshold technology for the creation of secure circuits. ISCAS 2008: 3182-3185 - 2007
- [c4]Syed Imtiaz Haider, Leyla Nazhandali:
A hybrid code compression technique using bitmask and prefix encoding with enhanced dictionary selection. CASES 2007: 58-62 - 2006
- [b1]Leyla Nazhandali:
Architectural optimization for performance- and energy -constrained sensor processors. University of Michigan, USA, 2006 - 2005
- [c3]Leyla Nazhandali, Michael Minuth, Bo Zhai, Javin Olson, Todd M. Austin, David T. Blaauw:
A second-generation sensor network processor with application-driven memory optimizations and out-of-order execution. CASES 2005: 249-256 - [c2]Leyla Nazhandali, Bo Zhai, Javin Olson, Anna Reeves, Michael Minuth, Ryan Helfand, Sanjay Pant, Todd M. Austin, David T. Blaauw:
Energy Optimization of Subthreshold-Voltage Sensor Network Processors. ISCA 2005: 197-207 - 2002
- [c1]Leyla Nazhandali, Karem A. Sakallah:
Majority-Based Decomposition of Carry Logic in Binary Adders. IWLS 2002: 179-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint