default search action
Catherine H. Gebotys
Person information
- affiliation: University of Waterloo, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j24]Mustafa Faraj, Catherine H. Gebotys:
Quiescent photonics side channel analysis: Low cost SRAM readout attack. Cryptogr. Commun. 13(3): 363-376 (2021) - 2020
- [j23]Karim Amin, Catherine H. Gebotys, Mustafa Faraj, Haohao Liao:
Analysis of Dynamic Laser Injection and Quiescent Photon Emissions on an Embedded Processor. J. Hardw. Syst. Secur. 4(1): 55-67 (2020) - [c54]Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys:
Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures). HOST 2020: 80-90 - [c53]Mahmoud A. Elmohr, Haohao Liao, Catherine H. Gebotys:
EM Fault Injection on ARM and RISC-V. ISQED 2020: 206-212 - [i8]Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys:
Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures). CoRR abs/2009.04063 (2020)
2010 – 2019
- 2019
- [c52]Mahmoud Khalafalla, Catherine H. Gebotys:
PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. DATE 2019: 204-209 - [c51]Haohao Liao, Catherine H. Gebotys:
Methodology for EM Fault Injection: Charge-based Fault Model. DATE 2019: 256-259 - [c50]Caio Hoffman, Catherine H. Gebotys, Diego F. Aranha, Mario Lúcio Côrtes, Guido Araújo:
Circumventing Uniqueness of XOR Arbiter PUFs. DSD 2019: 222-229 - 2018
- [c49]Saeed Nejati, Jan Horácek, Catherine H. Gebotys, Vijay Ganesh:
Algebraic Fault Attack on SHA Hash Functions Using Programmatic SAT Solvers. CP 2018: 737-754 - 2017
- [c48]Saeed Nejati, Zack Newsham, Joseph Scott, Jia Hui Liang, Catherine H. Gebotys, Pascal Poupart, Vijay Ganesh:
A Propagation Rate Based Splitting Heuristic for Divide-and-Conquer Solvers. SAT 2017: 251-260 - [c47]Saeed Nejati, Jia Hui Liang, Catherine H. Gebotys, Krzysztof Czarnecki, Vijay Ganesh:
Adaptive Restart and CEGAR-Based Solver for Inverting Cryptographic Hash Functions. VSTTE 2017: 120-131 - 2016
- [j22]Catherine H. Gebotys, Brian A. White, Edgar Mateos:
Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256. ACM Trans. Embed. Comput. Syst. 15(1): 4:1-4:19 (2016) - [i7]Saeed Nejati, Jia Hui Liang, Vijay Ganesh, Catherine H. Gebotys, Krzysztof Czarnecki:
Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions. CoRR abs/1608.04720 (2016) - 2015
- [j21]Catherine H. Gebotys, Brian A. White:
A Sliding Window Phase-Only Correlation Method for Side-Channel Alignment in a Smartphone. ACM Trans. Embed. Comput. Syst. 14(4): 80:1-80:22 (2015) - 2013
- [j20]Krithi Ramamritham, Catherine H. Gebotys:
Editorial Introduction of New Associate Editors. IEEE Embed. Syst. Lett. 5(1): 1-3 (2013) - [j19]Marcio Juliato, Catherine H. Gebotys:
A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. IEEE Trans. Aerosp. Electron. Syst. 49(3): 1536-1554 (2013) - 2011
- [c46]Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López:
Faster Explicit Formulas for Computing Pairings over Ordinary Curves. EUROCRYPT 2011: 48-68 - [c45]Amir Khatib Zadeh, Catherine H. Gebotys, Shahab Ardalan:
Counteracting power analysis attack using Static Single-ended Logic. ISCAS 2011: 721-724 - 2010
- [j18]Benoît Badrignans, David Champagne, Reouven Elbaz, Catherine H. Gebotys, Lionel Torres:
SARFUM: Security Architecture for Remote FPGA Update and Monitoring. ACM Trans. Reconfigurable Technol. Syst. 3(2): 8:1-8:29 (2010) - [c44]Edgar Mateos, Catherine H. Gebotys:
A new correlation frequency analysis of the side channel. WESS 2010: 4 - [c43]Patrick Longa, Catherine H. Gebotys:
Efficient Techniques for High-Speed Elliptic Curve Cryptography. CHES 2010: 80-94 - [i6]Patrick Longa, Catherine H. Gebotys:
Efficient Techniques for High-Speed Elliptic Curve Cryptography. IACR Cryptol. ePrint Arch. 2010: 315 (2010) - [i5]Patrick Longa, Catherine H. Gebotys:
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors. IACR Cryptol. ePrint Arch. 2010: 335 (2010) - [i4]Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López:
Faster Explicit Formulas for Computing Pairings over Ordinary Curves. IACR Cryptol. ePrint Arch. 2010: 526 (2010)
2000 – 2009
- 2009
- [j17]Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres:
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Trans. Comput. Sci. 4: 1-22 (2009) - [c42]Patrick Longa, Catherine H. Gebotys:
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. ACNS 2009: 71-88 - [c41]Amir Khatib Zadeh, Catherine H. Gebotys:
Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC). ISQED 2009: 230-235 - [c40]Amir Khatib Zadeh, Catherine H. Gebotys:
Leakage Power and Side Channel Security of Nanoscale Cryptosystem-on-Chip (CoC). ISVLSI 2009: 31-36 - [c39]Patrick Longa, Catherine H. Gebotys:
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Public Key Cryptography 2009: 443-462 - [c38]Marcio Juliato, Catherine H. Gebotys:
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. ReConFig 2009: 195-200 - [c37]Solmaz Ghaznavi, Catherine H. Gebotys, Reouven Elbaz:
Efficient Technique for the FPGA Implementation of the AES MixColumns Transformation. ReConFig 2009: 219-224 - [i3]Patrick Longa, Catherine H. Gebotys:
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. IACR Cryptol. ePrint Arch. 2009: 173 (2009) - 2008
- [j16]Catherine H. Gebotys, Brian A. White:
EM alignment using phase for secure embedded systems. Des. Autom. Embed. Syst. 12(3): 185-206 (2008) - [j15]Catherine H. Gebotys, Brian A. White:
EM analysis of a wireless Java-based PDA. ACM Trans. Embed. Comput. Syst. 7(4): 44:1-44:28 (2008) - [c36]Marcio Juliato, Catherine H. Gebotys:
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks. AHS 2008: 101-108 - [c35]David Champagne, Reouven Elbaz, Catherine H. Gebotys, Lionel Torres, Ruby B. Lee:
Forward-Secure Content Distribution to Reconfigurable Hardware. ReConFig 2008: 450-455 - [e1]Catherine H. Gebotys, Grant Martin:
Proceedings of the 6th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2008, Atlanta, GA, USA, October 19-24, 2008. ACM 2008, ISBN 978-1-60558-470-6 [contents] - [i2]Patrick Longa, Catherine H. Gebotys:
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication. IACR Cryptol. ePrint Arch. 2008: 118 (2008) - [i1]Patrick Longa, Catherine H. Gebotys:
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. IACR Cryptol. ePrint Arch. 2008: 526 (2008) - 2007
- [c34]Catherine H. Gebotys, Brian A. White:
A Phase Substitution Technique for DEMA of Embedded Cryptographic Systems. ITNG 2007: 868-869 - [c33]Amir Khatib Zadeh, Catherine H. Gebotys:
Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. ITNG 2007: 898-899 - 2006
- [j14]Catherine H. Gebotys:
A split-mask countermeasure for low-energy secure embedded systems. ACM Trans. Embed. Comput. Syst. 5(3): 577-612 (2006) - [j13]Catherine H. Gebotys:
A table masking countermeasure for low-energy secure embedded systems. IEEE Trans. Very Large Scale Integr. Syst. 14(7): 740-753 (2006) - [c32]Catherine H. Gebotys, Brian A. White:
Methodology for attack on a Java-based PDA. CODES+ISSS 2006: 94-99 - 2005
- [j12]Radu Muresan, Catherine H. Gebotys:
Instantaneous current modeling in a complex VLIW processor core. ACM Trans. Embed. Comput. Syst. 4(2): 415-451 (2005) - [c31]Catherine H. Gebotys, Simon Ho, C. C. Tiu:
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. CHES 2005: 250-264 - [c30]Catherine H. Gebotys, C. C. Tiu, X. Chen:
A Countermeasure for EM Attack of a Wireless PDA. ITCC (1) 2005: 544-549 - [c29]Tim Woo, Catherine H. Gebotys, Sagar Naik:
An Energy-Efficient Image Representation for Secure Mobile Systems. NETWORKING 2005: 126-137 - 2004
- [j11]Catherine H. Gebotys:
Design of secure cryptography against the threat of power-attacks in DSP-embedded processors. ACM Trans. Embed. Comput. Syst. 3(1): 92-113 (2004) - [c28]Peter Marwedel, Catherine H. Gebotys:
Secure and safety-critical vs. insecure, non safety-critical embedded systems: do they require completely different design approaches? CODES+ISSS 2004: 72 - [c27]Radu Muresan, Catherine H. Gebotys:
Current flattening in software and hardware for security applications. CODES+ISSS 2004: 218-223 - [c26]Catherine H. Gebotys:
Low energy security optimization in embedded cryptographic systems. CODES+ISSS 2004: 224-229 - 2003
- [c25]Catherine H. Gebotys, Y. Zhang:
Security wrappers and power analysis for SoC technologies. CODES+ISSS 2003: 162-167 - [c24]Catherine H. Gebotys, Robert J. Gebotys:
A Framework for Security on NoC Technologies. ISVLSI 2003: 113-120 - 2002
- [j10]Catherine H. Gebotys:
A network flow approach to memory bandwidth utilization in embedded DSP core processors. IEEE Trans. Very Large Scale Integr. Syst. 10(4): 390-398 (2002) - [c23]Catherine H. Gebotys, Robert J. Gebotys:
Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor. CHES 2002: 114-128 - [c22]Catherine H. Gebotys:
Security-Driven Exploration of Cryptography in DSP Cores. ISSS 2002: 80-85 - [c21]Hiroto Yasuura, Naofumi Takagi, Srivaths Ravi, Michael Torla, Catherine H. Gebotys:
Special Session: Security on SoC. ISSS 2002: 192-194 - 2001
- [c20]Catherine H. Gebotys:
Utilizing Memory Bandwidth in DSP Embedded Processors. DAC 2001: 347-352 - [c19]Catherine H. Gebotys, Radu Muresan:
Modeling Power Dynamics for an Embedded DSP Processor Core. An Empirical Model. VLSI-SOC 2001: 205-216 - [c18]Radu Muresan, Catherine H. Gebotys:
Current consumption dynamics at instruction and program level for a VLIW DSP processor. ISSS 2001: 130-135 - 2000
- [c17]Catherine H. Gebotys, Robert J. Gebotys, S. Wiratunga:
Power minimization derived from architectural-usage of VLIW processors. DAC 2000: 308-311
1990 – 1999
- 1999
- [j9]Catherine H. Gebotys, Robert J. Gebotys:
Statistically based prediction of power dissipation for complex embedded DSP processors. Microprocess. Microsystems 23(3): 135-144 (1999) - [j8]Catherine H. Gebotys:
A minimum-cost circulation approach to DSP address-code generation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 18(6): 726-741 (1999) - [c16]Catherine H. Gebotys, Robert J. Gebotys:
Designing for Low Power in Complex Embedded DSP Systems. HICSS 1999 - 1998
- [j7]Catherine H. Gebotys:
Network Flow Approach to Data Regeneration for Low Energy Embedded System Synthesis. Integr. Comput. Aided Eng. 5(2): 117-128 (1998) - [j6]Catherine H. Gebotys:
Optimizing Energy During Systems Synthesis of Computer Intensive Realtime Applications. VLSI Design 7(3): 303-320 (1998) - [c15]Catherine H. Gebotys, Robert J. Gebotys:
Complexities in DSP Software Compilation: Performance, Code Size Power, Retargetability. HICSS (3) 1998: 150-156 - [c14]Catherine H. Gebotys, Robert J. Gebotys:
An empirical comparison of algorithmic, instruction, and architectural power prediction models for high performance embedded DSP processors. ISLPED 1998: 121-123 - 1997
- [j5]Sarita V. Adve, Doug Burger, Rudolf Eigenmann, Alasdair Rawsthorne, Michael D. Smith, Catherine H. Gebotys, Mahmut T. Kandemir, David J. Lilja, Alok N. Choudhary, Jesse Zhixi Fang, Pen-Chung Yew:
Changing Interaction of Compiler and Architecture. Computer 30(12): 51-58 (1997) - [c13]Catherine H. Gebotys:
Low Energy Memory and Register Allocation Using Network Flow. DAC 1997: 435-440 - [c12]Catherine H. Gebotys, Robert J. Gebotys:
Performance-Power Optimization of Memory Components for Complex Embedded Systems. HICSS (5) 1997: 152-159 - [c11]Catherine H. Gebotys:
DSP address optimization using a minimum cost circulation technique. ICCAD 1997: 100-103 - [c10]Catherine H. Gebotys:
An Efficient Model for DSP Code Generation: Performance, Code Size, Estimated Energy. ISSS 1997: 41- - 1996
- [c9]Catherine H. Gebotys, Robert J. Gebotys:
Power Minimization in Heterogeneous Processing. HICSS (1) 1996: 330-337 - 1995
- [j4]Catherine H. Gebotys:
An optimal methodology for synthesis of DSP multichip architectures. J. VLSI Signal Process. 11(1-2): 9-19 (1995) - [c8]Catherine H. Gebotys, Robert J. Gebotys:
Optimized mapping of video applications to hardware-software for VLSI architectures. HICSS (1) 1995: 41-48 - 1994
- [j3]Catherine H. Gebotys:
An optimization approach to the synthesis of multichip architectures. IEEE Trans. Very Large Scale Integr. Syst. 2(1): 11-20 (1994) - [c7]Catherine H. Gebotys, Robert J. Gebotys:
Application-Specific Architectures for Field-Programmable VLSI Technologies. HICSS (1) 1994: 124-131 - 1993
- [j2]Catherine H. Gebotys, Mohamed I. Elmasry:
Global optimization approach for architectural synthesis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 12(9): 1266-1278 (1993) - [j1]Catherine H. Gebotys:
Throughput optimized architectural synthesis. IEEE Trans. Very Large Scale Integr. Syst. 1(3): 254-261 (1993) - 1992
- [c6]Catherine H. Gebotys:
Optimal Scheduling and Allocation of Embedded VLSI Chips. DAC 1992: 116-119 - [c5]Catherine H. Gebotys:
Optimal synthesis of multichip architectures. ICCAD 1992: 238-241 - 1991
- [c4]Catherine H. Gebotys, Mohamed I. Elmasry:
Simultaneous Scheduling and Allocation for Cost Constrained Optimal Architectural Synthesis. DAC 1991: 2-7 - 1990
- [c3]Catherine H. Gebotys, Mohamed I. Elmasry:
A Global Optimization Approach for Architectural Synthesis. ICCAD 1990: 258-261
1980 – 1989
- 1988
- [c2]Catherine H. Gebotys, Mohamed I. Elmasry:
VLSI Design Synthesis with Testability. DAC 1988: 16-21 - [c1]Catherine H. Gebotys, Mohamed I. Elmasry:
Integrated design and test synthesis. ICCD 1988: 398-401
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint