0.3(top 100%)
impact factor
76(top 100%)
papers
126(top 50%)
citations
7(top 50%)
h-index
0.4(top 50%)
extended IF
137
all documents
133
doc citations
10(top 50%)
g-index
Top Articles
# | Title | Journal | Year | Citations |
---|---|---|---|---|
1 | A Modern Primer on Processing in Memory | Computer Architecture and Design Methodologies | 2023 | 24 |
2 | Energy Efficient High Performance Processors | Computer Architecture and Design Methodologies | 2018 | 14 |
3 | Advanced Fault Attacks in Software: Exploiting the Rowhammer Bug | Computer Architecture and Design Methodologies | 2018 | 11 |
4 | Fully Homomorphic Encryption in Real World Applications | Computer Architecture and Design Methodologies | 2019 | 10 |
5 | Power Management of Modern Processors | Computer Architecture and Design Methodologies | 2018 | 9 |
6 | Classical and Physical Security of Symmetric Key Cryptographic Algorithms | Computer Architecture and Design Methodologies | 2022 | 7 |
7 | Reconfigurable Architectures: The Shift from General Systems to Domain Specific Solutions | Computer Architecture and Design Methodologies | 2023 | 5 |
8 | Laser-Based Fault Injection on Microcontrollers | Computer Architecture and Design Methodologies | 2018 | 4 |
9 | Machine Learning-Assisted Differential Distinguishers for Lightweight Ciphers | Computer Architecture and Design Methodologies | 2022 | 4 |
10 | Compact and Fast Machine Learning Accelerator for IoT Devices | Computer Architecture and Design Methodologies | 2019 | 3 |
11 | Romulus: Lighweight AEAD from Tweakable Block Ciphers | Computer Architecture and Design Methodologies | 2022 | 3 |
12 | Sorting on Encrypted Data | Computer Architecture and Design Methodologies | 2019 | 2 |
13 | Intelligent Edge Biomedical Sensors in the Internet of Things (IoT) Era | Computer Architecture and Design Methodologies | 2023 | 2 |
14 | Classical Countermeasures Against Differential Fault Analysis | Computer Architecture and Design Methodologies | 2018 | 1 |
15 | Fault Space Transformation: Countering Biased Fault Attacks | Computer Architecture and Design Methodologies | 2018 | 1 |
16 | High Level Synthesis for Symmetric Key Cryptography | Computer Architecture and Design Methodologies | 2019 | 1 |
17 | Lattice-Based Public-Key Cryptography in Hardware | Computer Architecture and Design Methodologies | 2020 | 1 |
18 | Dynamic Optimizations for Energy Efficiency | Computer Architecture and Design Methodologies | 2018 | 1 |
19 | Translating Algorithms to Handle Fully Homomorphic Encrypted Data | Computer Architecture and Design Methodologies | 2019 | 1 |
20 | Power Modeling at High-Performance Computing Processors | Computer Architecture and Design Methodologies | 2018 | 1 |
21 | DEFAULT: Cipher-Level Resistance Against Differential Fault Attack | Computer Architecture and Design Methodologies | 2022 | 1 |
22 | New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming | Computer Architecture and Design Methodologies | 2022 | 1 |
23 | Differential Paradox: How an SBox Plays Against Differential Fault Analysis | Computer Architecture and Design Methodologies | 2022 | 1 |
24 | Hardware Security in Emerging Photonic Network-on-Chip Architectures | Computer Architecture and Design Methodologies | 2023 | 1 |
25 | Compiler-Directed Energy Efficiency | Computer Architecture and Design Methodologies | 2018 | 0 |
26 | Hybrid Application Mapping | Computer Architecture and Design Methodologies | 2018 | 0 |
27 | Invasive Computing | Computer Architecture and Design Methodologies | 2018 | 0 |
28 | Self-embedding | Computer Architecture and Design Methodologies | 2018 | 0 |
29 | Hybrid Mapping for Increased Security | Computer Architecture and Design Methodologies | 2018 | 0 |
30 | Automation of Fault Analysis | Computer Architecture and Design Methodologies | 2018 | 0 |
31 | Hybrid Network-on-Chip Simulation | Computer Architecture and Design Methodologies | 2019 | 0 |
32 | ActorX10 and Run-Time Application Embedding | Computer Architecture and Design Methodologies | 2019 | 0 |
33 | Study of Flexibility | Computer Architecture and Design Methodologies | 2019 | 0 |
34 | Dwarfs of Cryptography | Computer Architecture and Design Methodologies | 2019 | 0 |
35 | Manual Optimizations for Efficient Designs | Computer Architecture and Design Methodologies | 2019 | 0 |
36 | Tensor-Solver for Deep Neural Network | Computer Architecture and Design Methodologies | 2019 | 0 |
37 | Fundamentals and Literature Review | Computer Architecture and Design Methodologies | 2019 | 0 |
38 | Least-Squares-Solver for Shallow Neural Network | Computer Architecture and Design Methodologies | 2019 | 0 |
39 | Conclusion and Future Works | Computer Architecture and Design Methodologies | 2019 | 0 |
40 | On-Demand Fault Tolerance on Massively Parallel Processor Arrays | Computer Architecture and Design Methodologies | 2016 | 0 |
41 | Invasive Tightly Coupled Processor Arrays | Computer Architecture and Design Methodologies | 2016 | 0 |
42 | Self-adaptive Power and Energy Management for TCPAs | Computer Architecture and Design Methodologies | 2016 | 0 |
43 | Architectural Reliability Exploration | Computer Architecture and Design Methodologies | 2018 | 0 |
44 | State-of-the-Art | Computer Architecture and Design Methodologies | 2018 | 0 |
45 | System-Level Reliability Exploration | Computer Architecture and Design Methodologies | 2018 | 0 |
46 | Architectural Reliability Estimation | Computer Architecture and Design Methodologies | 2018 | 0 |
47 | Infective Countermeasures Against Fault Analysis | Computer Architecture and Design Methodologies | 2018 | 0 |
48 | Reactive Design Strategies Against Fault Injection Attacks | Computer Architecture and Design Methodologies | 2018 | 0 |
49 | Introduction to Fault Attacks | Computer Architecture and Design Methodologies | 2018 | 0 |
50 | Distributed-Solver for Networked Neural Network | Computer Architecture and Design Methodologies | 2019 | 0 |