default search action
Bertrand Cambou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Brit Riggs, Dina Ghanai Miandoab, Bertrand Cambou:
Ternary Two Wavelength Quantum Key Distribution Protocol With Physical Unclonable Function Error Models and Eavesdropper Detection. CyberC 2024: 175-181 - [c30]Taylor Wilson, Saloni Jain, Jack Garrard, Bertrand Cambou, Ian Burke:
Characterization of ReRAM Arrays Operating in the Pre-formed Range to Design Reliable PUFs. SAI (4) 2024: 328-350 - [c29]Saloni Jain, Manuel Aguilar Rios, Bertrand Cambou:
Enhancing True Random Number Generation in MRAM Devices Through Response Adjustment. SAI (4) 2024: 438-454 - [c28]Saloni Jain, Ashwija Reddy Korenda, Bertrand Cambou, Chris Lucero:
Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys. SAI (2) 2024: 478-498 - [c27]Manuel Aguilar Rios, Michael Partridge, Saloni Jain, Bertrand Cambou:
True Random Numbers from Pairs of SRAM Devices. SAI (3) 2024: 630-650 - 2023
- [j11]Bertrand Cambou, Christopher Robert Philabaum, Jeffrey Hoffstein, Maurice Herlihy:
Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments. Axioms 12(6): 531 (2023) - [c26]Kaitlyn Lee, Brian Donnelly, Tomer Sery, Dan Ilan, Bertrand Cambou, Michael Gowanlock:
Evaluating Accelerators for a High-Throughput Hash-Based Security Protocol. ICPP Workshops 2023: 40-49 - 2022
- [j10]Amir Ali Pour, Fatemeh Afghah, David Hély, Vincent Beroulle, Giorgio Di Natale, Ashwija Reddy Korenda, Bertrand Cambou:
Helper Data Masking for Physically Unclonable Function-Based Key Generation Algorithms. IEEE Access 10: 40150-40164 (2022) - [j9]Brit Riggs, Michael Partridge, Bertrand Cambou, Ian Burke, Manuel Aguilar Rios, Julie Heynssens, Dina Ghanaimiandoab:
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function. Cryptogr. 6(3): 36 (2022) - [c25]Taylor Wilson, Bertrand Cambou, Brit Riggs, Ian Burke, Julie Heynssens, Sung Hyun Jo:
Design and Analysis of Pre-formed ReRAM-Based PUF. SAI (3) 2022: 532-549 - [c24]Dina Ghanai Miandaob, Duane Booher, Bertrand Cambou, Sareh Assiri:
Hash Based Encryption Schemes Using Physically Unclonable Functions. SAI (3) 2022: 602-616 - [c23]Manuel Aguilar Rios, Sareh Assiri, Bertrand Cambou:
Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUF. SAI (3) 2022: 825-836 - [c22]Saloni Jain, Taylor Wilson, Sareh Assiri, Bertrand Cambou:
Bit Error Rate Analysis of Pre-formed ReRAM-based PUF. SAI (3) 2022: 882-901 - 2021
- [j8]Mohammad Mohammadinodoushan, Bertrand Cambou, Christopher Robert Philabaum, Nan Duan:
Resilient Password Manager Using Physical Unclonable Functions. IEEE Access 9: 17060-17070 (2021) - [j7]Mohammad Mohammadinodoushan, Bertrand Cambou, Fatemeh Afghah, Christopher Robert Philabaum, Ian Burke:
Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF. IEEE Access 9: 155711-155725 (2021) - [j6]Bertrand Cambou, Donald Telesca, Sareh Assiri, Michael Garrett, Saloni Jain, Michael Partridge:
TRNGs from Pre-Formed ReRAM Arrays. Cryptogr. 5(1): 8 (2021) - [c21]Jordan Wright, Zane Fink, Michael Gowanlock, Christopher Robert Philabaum, Brian Donnelly, Bertrand Cambou:
A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using GPGPU. CNS 2021: 146-154 - [c20]Ashwija Reddy Korenda, Sareh Assiri, Fatemeh Afghah, Bertrand Cambou:
An Error Correction Approach to Memristors PUF-based Key Encapsulation. COINS 2021: 1-6 - [c19]Kaitlyn Lee, Michael Gowanlock, Bertrand Cambou:
SABER-GPU: A Response-Based Cryptography Algorithm for SABER on the GPU. PRDC 2021: 123-132 - [c18]Christopher Robert Philabaum, Christopher Coffey, Bertrand Cambou, Michael Gowanlock:
A Response-Based Cryptography Engine in Distributed-Memory. SAI (3) 2021: 904-922 - [c17]Bertrand Cambou, Ying-Chen Chen:
Tamper Sensitive Ternary ReRAM-Based PUFs. SAI (3) 2021: 1020-1040 - [i4]Dina Ghanai Miandoab, Sareh Assiri, Joseph Mihaljevic, Bertrand Cambou:
Statistical Analysis of ReRAM-PUF based Keyless Encryption Protocol Against Frequency Analysis Attack. CoRR abs/2109.11075 (2021) - 2020
- [j5]Arash Nejat, Frederic Ouattara, Mohammad Mohammadinodoushan, Bertrand Cambou, Ken Mackay, Lionel Torres:
Practical Experiments to Evaluate Quality Metrics of MRAM-Based Physical Unclonable Functions. IEEE Access 8: 176042-176049 (2020) - [j4]Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Robert Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla:
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions. Cryptogr. 4(2): 17 (2020) - [j3]Bertrand Cambou, David Hély, Sareh Assiri:
Cryptography with Analog Scheme Using Memristors. ACM J. Emerg. Technol. Comput. Syst. 16(4): 40:1-40:30 (2020) - [c16]Amir Alipour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, David Hély, Sylvain Guilley, Naghmeh Karimi:
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. ETS 2020: 1-10 - [c15]Paul G. Flikkema, James Palmer, Tolga Yalçin, Bertrand Cambou:
Dynamic Computational Diversity with Multi-Radix Logic and Memory. HPEC 2020: 1-6 - [c14]Bertrand Cambou, Mohammad Mohammadi, Christopher Robert Philabaum, Duane Booher:
Statistical Analysis to Optimize the Generation of Cryptographic Keys from Physical Unclonable Functions. SAI (3) 2020: 302-321 - [c13]Sareh Assiri, Bertrand Cambou, Duane Booher, Mohammad Mohammadinodoushan:
Software Implementation of a SRAM PUF-Based Password Manager. SAI (3) 2020: 361-379 - [c12]Yuxuan Zhu, Bertrand Cambou, David Hély, Sareh Assiri:
Extended Protocol Using Keyless Encryption Based on Memristors. SAI (3) 2020: 494-510
2010 – 2019
- 2019
- [c11]Duane Booher, Bertrand Cambou, Albert H. Carlson, Christopher Robert Philabaum:
Dynamic Key Generation for Polymorphic Encryption. CCWC 2019: 482-487 - [c10]Sareh Assiri, Bertrand Cambou, Duane Booher, Dina Ghanai Miandoab, Mohammad Mohammadinodoushan:
Key Exchange using Ternary system to Enhance Security. CCWC 2019: 488-492 - [c9]Ashwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou, Christopher Robert Philabaum:
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices. SECON 2019: 1-8 - [c8]Mohammad Mohammadinodoushan, Bertrand Cambou, Christopher Robert Philabaum, David Hély, Duane Booher:
Implementation of Password Management System Using Ternary Addressable PUF Generator. SECON 2019: 1-8 - [c7]Bertrand Cambou:
Unequally Powered Cryptography With Physical Unclonable Functions for Networks of Internet of Things Terminals. SpringSim 2019: 1-13 - [i3]Ashwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou, Christopher Robert Philabaum:
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices. CoRR abs/1907.12144 (2019) - 2018
- [j2]Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca, Christopher Robert Philabaum:
Can Ternary Computing Improve Information Assurance? Cryptogr. 2(1): 6 (2018) - [j1]Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally:
A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks. Int. J. Wirel. Inf. Networks 25(2): 117-129 (2018) - [c6]Ashwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou:
A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions. IWCMC 2018: 1261-1266 - [i2]Ashwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou:
A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions. CoRR abs/1805.06980 (2018) - 2017
- [c5]Bilal Habib, Bertrand Cambou, Duane Booher, Christopher Robert Philabaum:
Public key exchange scheme that is addressable (PKA). CNS 2017: 392-393 - [c4]Paul G. Flikkema, Bertrand Cambou:
When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants. GIoTS 2017: 1-4 - [c3]Bertrand Cambou, Fatemeh Afghah, Derek Sonderegger, Jennifer Taggart, Hugh J. Barnaby, Michael N. Kozicki:
Ag conductive bridge RAMs for physical unclonable functions. HOST 2017: 151 - [i1]Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally:
A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to Enhance Authentication Security in Software Defined Wireless Networks. CoRR abs/1712.09916 (2017) - 2016
- [c2]Bertrand Cambou, Marius Orlowski:
PUF designed with Resistive RAM and Ternary States. CISRC 2016: 1:1-1:8 - [c1]Paul G. Flikkema, Bertrand Cambou:
Adapting processor architectures for the periphery of the IoT nervous system. WF-IoT 2016: 615-620
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 18:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint