Soroush Khaleghi

Learn More
In this paper we discuss and analyze an enhanced media access control (MAC) layer protocol which uses the signaling method benefits of physical layer in order to provide different quality of service (QoS) levels in optical code-division multiple-access (OCDMA) packet networks. In the proposed network architecture the users are categorized into the high and(More)
Globalization of the semiconductor industry has raised serious concerns about trustworthy hardware. Particularly, an untrusted manufacturer can steal the information of a design (Reverse Engineering), and/or produce extra chips illegally (IC Piracy). Among many candidates that address these attacks, Design Withholding techniques work by replacing a part of(More)
Physically Unclonable Functions (PUFs) are an emerging technology that could play the key roles in various security applications. Depending upon the size of its truth-table, i.e., the search space for an attacker to fully specify its behavior, a PUF can be categorized as either“weak”or“strong”. While weak PUFs have a limited search space, polynomial with(More)
  • 1