scispace - formally typeset
M

Mahabub Hasan Mahalat

Researcher at National Institute of Technology, Durgapur

Publications -  17
Citations -  105

Mahabub Hasan Mahalat is an academic researcher from National Institute of Technology, Durgapur. The author has contributed to research in topics: Netlist & Hardware Trojan. The author has an hindex of 4, co-authored 11 publications receiving 44 citations. Previous affiliations of Mahabub Hasan Mahalat include Aliah University.

Papers
More filters
Proceedings ArticleDOI

A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices

TL;DR: A PUF based lightweight protocol is proposed which establishes the secure connection utilizing three pairs of challenge-response and generates a random number as a seed key used by the underlying WiFi protocol which proves its effectiveness while incurs less resource and computation overhead.
Journal ArticleDOI

An efficient clocking scheme for quantum-dot cellular automata

TL;DR: A robust, efficient and scalable (RES) clocking scheme for QCA circuit is proposed which can facilitate three directional information flow within a single clock zone and overcome the complex multilayer wire crossing with most promising coplanar crossover.
Proceedings ArticleDOI

An Efficient Implementation of Arbiter PUF on FPGA for IoT Application

TL;DR: A new switching structure named path changing switch (PCS) is introduced which is easily implementable on FPGA and used here to design APUF instead of the PDL, and the directed routing constraint is used to implement an exemplary APUF which possess better flexibility.
Proceedings ArticleDOI

A Novel Test Vector Generation Method for Hardware Trojan Detection

TL;DR: A methodology to produce test vector is proposed in this work which generates rare signals inside a circuit based on the impact of primary inputs on rare nets to stimulate rare signals across the netlist.
Proceedings ArticleDOI

XOR based Methodology to Detect Hardware Trojan utilizing the Transition Probability

TL;DR: An efficient methodology by inserting XOR gates inside a netlist is proposed here to detect the presence of Trojan and Experimental result shows that the proposed method achieved significant improvement in terms of number of transitions at possible vulnerable nets while overcoming the limitations of the previous works.