0.3(top 100%)
impact factor
76(top 100%)
papers
126(top 50%)
citations
7(top 50%)
h-index
0.4(top 50%)
extended IF
137
all documents
133
doc citations
10(top 50%)
g-index

Top Articles

#TitleJournalYearCitations
1A Modern Primer on Processing in MemoryComputer Architecture and Design Methodologies202324
2Energy Efficient High Performance ProcessorsComputer Architecture and Design Methodologies201814
3Advanced Fault Attacks in Software: Exploiting the Rowhammer BugComputer Architecture and Design Methodologies201811
4Fully Homomorphic Encryption in Real World ApplicationsComputer Architecture and Design Methodologies201910
5Power Management of Modern ProcessorsComputer Architecture and Design Methodologies20189
6Classical and Physical Security of Symmetric Key Cryptographic AlgorithmsComputer Architecture and Design Methodologies20227
7Reconfigurable Architectures: The Shift from General Systems to Domain Specific SolutionsComputer Architecture and Design Methodologies20235
8Laser-Based Fault Injection on MicrocontrollersComputer Architecture and Design Methodologies20184
9Machine Learning-Assisted Differential Distinguishers for Lightweight CiphersComputer Architecture and Design Methodologies20224
10Compact and Fast Machine Learning Accelerator for IoT DevicesComputer Architecture and Design Methodologies20193
11Romulus: Lighweight AEAD from Tweakable Block CiphersComputer Architecture and Design Methodologies20223
12Sorting on Encrypted DataComputer Architecture and Design Methodologies20192
13Intelligent Edge Biomedical Sensors in the Internet of Things (IoT) EraComputer Architecture and Design Methodologies20232
14Classical Countermeasures Against Differential Fault AnalysisComputer Architecture and Design Methodologies20181
15Fault Space Transformation: Countering Biased Fault AttacksComputer Architecture and Design Methodologies20181
16High Level Synthesis for Symmetric Key CryptographyComputer Architecture and Design Methodologies20191
17Lattice-Based Public-Key Cryptography in HardwareComputer Architecture and Design Methodologies20201
18Dynamic Optimizations for Energy EfficiencyComputer Architecture and Design Methodologies20181
19Translating Algorithms to Handle Fully Homomorphic Encrypted DataComputer Architecture and Design Methodologies20191
20Power Modeling at High-Performance Computing ProcessorsComputer Architecture and Design Methodologies20181
21DEFAULT: Cipher-Level Resistance Against Differential Fault AttackComputer Architecture and Design Methodologies20221
22New Insights on Differential and Linear Bounds Using Mixed Integer Linear ProgrammingComputer Architecture and Design Methodologies20221
23Differential Paradox: How an SBox Plays Against Differential Fault AnalysisComputer Architecture and Design Methodologies20221
24Hardware Security in Emerging Photonic Network-on-Chip ArchitecturesComputer Architecture and Design Methodologies20231
25Compiler-Directed Energy EfficiencyComputer Architecture and Design Methodologies20180
26Hybrid Application MappingComputer Architecture and Design Methodologies20180
27Invasive ComputingComputer Architecture and Design Methodologies20180
28Self-embeddingComputer Architecture and Design Methodologies20180
29Hybrid Mapping for Increased SecurityComputer Architecture and Design Methodologies20180
30Automation of Fault AnalysisComputer Architecture and Design Methodologies20180
31Hybrid Network-on-Chip SimulationComputer Architecture and Design Methodologies20190
32ActorX10 and Run-Time Application EmbeddingComputer Architecture and Design Methodologies20190
33Study of FlexibilityComputer Architecture and Design Methodologies20190
34Dwarfs of CryptographyComputer Architecture and Design Methodologies20190
35Manual Optimizations for Efficient DesignsComputer Architecture and Design Methodologies20190
36Tensor-Solver for Deep Neural NetworkComputer Architecture and Design Methodologies20190
37Fundamentals and Literature ReviewComputer Architecture and Design Methodologies20190
38Least-Squares-Solver for Shallow Neural NetworkComputer Architecture and Design Methodologies20190
39Conclusion and Future WorksComputer Architecture and Design Methodologies20190
40On-Demand Fault Tolerance on Massively Parallel Processor ArraysComputer Architecture and Design Methodologies20160
41Invasive Tightly Coupled Processor ArraysComputer Architecture and Design Methodologies20160
42Self-adaptive Power and Energy Management for TCPAsComputer Architecture and Design Methodologies20160
43Architectural Reliability ExplorationComputer Architecture and Design Methodologies20180
44State-of-the-ArtComputer Architecture and Design Methodologies20180
45System-Level Reliability ExplorationComputer Architecture and Design Methodologies20180
46Architectural Reliability EstimationComputer Architecture and Design Methodologies20180
47Infective Countermeasures Against Fault AnalysisComputer Architecture and Design Methodologies20180
48Reactive Design Strategies Against Fault Injection AttacksComputer Architecture and Design Methodologies20180
49Introduction to Fault AttacksComputer Architecture and Design Methodologies20180
50Distributed-Solver for Networked Neural NetworkComputer Architecture and Design Methodologies20190