DPA-secured quasi-adiabatic logic (SQAL) for low-power passive RFID tags employing S-boxes M Avital, H Dagan, I Levi, O Keren, A Fish IEEE Transactions on Circuits and Systems I: Regular Papers 62 (1), 149-156, 2014 | 49 | 2014 |

Robust generalized punctured cubic codes Y Neumeier, O Keren IEEE Transactions on Information Theory 60 (5), 2813-2822, 2014 | 30* | 2014 |

Data-dependent delays as a barrier against power attacks I Levi, O Keren, A Fish IEEE Transactions on Circuits and Systems I: Regular Papers 62 (8), 2069-2078, 2015 | 27 | 2015 |

Reduction of average path length in binary decision diagrams by spectral methods O Keren IEEE Transactions on Computers 57 (4), 520-531, 2008 | 27 | 2008 |

Puncturing, expurgating and expanding the q-ary BCH based robust codes N Admaty, S Litsyn, O Keren 2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, 1-5, 2012 | 25 | 2012 |

Designing fault tolerant FSM by nano-PLA S Baranov, I Levin, O Keren, M Karpovsky 2009 15th IEEE International On-Line Testing Symposium, 229-234, 2009 | 25 | 2009 |

More on the distance distribution of BCH codes O Keren, S Litsyn IEEE Transactions on Information Theory 45 (1), 251-255, 1999 | 25 | 1999 |

Randomized multitopology logic against differential power analysis M Avital, H Dagan, O Keren, A Fish IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23 (4), 702-711, 2014 | 21 | 2014 |

Protecting cryptographic hardware against malicious attacks by nonlinear robust codes V Tomashevich, Y Neumeier, R Kumar, O Keren, I Polian 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2014 | 20 | 2014 |

A comment on the Karpovsky–Taubin code S Engelberg, O Keren IEEE transactions on information theory 57 (12), 8007-8010, 2011 | 17 | 2011 |

Linearization of logical functions defined by a set of orthogonal terms. I. Theoretical aspects O Keren, I Levin, R Stankovič Automation and Remote Control 72 (3), 615-625, 2011 | 16* | 2011 |

A class of array codes correcting multiple column erasures O Keren, S Litsyn IEEE Transactions on Information Theory 43 (6), 1843-1851, 1997 | 16 | 1997 |

Robustness of security-oriented binary codes under non-uniform distribution of codewords O Keren, I Shumsky, MG Karpovsky Proc. 6th Int. Conf. on Dependability. Barcelona, Spain, 25-30, 2013 | 15 | 2013 |

Robustness of security-oriented binary codes under non-uniform distribution of codewords O Keren, I Shumsky, MG Karpovsky Proc. 6th Int. Conf. on Dependability. Barcelona, Spain, 25-30, 2013 | 15 | 2013 |

Relations between the entropy of a source and the error masking probability for security-oriented codes O Keren, M Karpovsky IEEE Transactions on Communications 63 (1), 206-214, 2014 | 13 | 2014 |

Determining the number of paths in decision diagrams by using autocorrelation coefficients O Keren, I Levin, RS Stankovic IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2010 | 13* | 2010 |

Codes correcting phased burst erasures O Keren, S Litsyn IEEE Transactions on Information Theory 44 (1), 416-420, 1998 | 12 | 1998 |

CPA secured data-dependent delay-assignment methodology I Levi, A Fish, O Keren IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (2), 608-620, 2016 | 11 | 2016 |

Enhancement of hardware security by hamming-ball based state assignment I Shumsky, O Keren Information Security Journal: A Global Perspective 22 (5-6), 216-225, 2013 | 11* | 2013 |

A lower bound on the probability of decoding error over a BSC channel O Keren, S Litsyn 21st IEEE Convention of the Electrical and Electronic Engineers in Israel …, 2000 | 11 | 2000 |