**Journal Papers**

**O. Keren**and S. Litsyn, "A class of array codes correcting multiple column erasures,"*IEEE Trans. on Information Theory*, vol. 43, No. 6, pp. 1843-1851,1997**O. Keren**and S. Litsyn, "Codes correcting phased burst errors," I*EEE Trans. On Information Theory*, vol. 44, no. 1, pp. 416-420, 1998**O. Keren**and S. Litsyn, "The number of solutions to a system of equations and spectra of codes," in*the book “Finite Fields -Theory Applications and Algorithms," AMS*, pp. 177-184. 1998**O. Keren**and S. Litsyn, "More on the distance distribution of BCH codes," in*IEEE Trans. on Information Theory*, vol. 45, no. 1, pp. 251-255, 1999**O. Keren**, "Efficient linear decomposition of multi output Boolean functions represented in SOP form,"*WSEAS transactions on circuits and systems*, vol. 5, no. 2, pp. 219-226, 2006- V. Ostrovsky, I. Levin,
**O. Keren**, B. Abramov, "Designing Concurrent Checking Circuits by using Partitioning,"*The International Journal of Highly Reliable Electronic System*, vol. 1, no.1, pp. 1-11, 2007 - I. Levin,
**O. Keren**and V. Ostrovsky, "Synthesis of Sequential Circuits by using Linearization," Facta Universitatis,*special issue on Binary and Multiple-Valued Switching Theory and Circuit Design*, vol. 20, no. 3, pp. 461-477, 2007 **O. Keren**and I. Levin, "Linearization of Multi-Output Logic Functions by Ordering of the Autocorrelation Values,"*Facta Universitatis, special issue on Binary and Multiple-Valued Switching Theory and Circuit Design*, vol. 20, no. 3, pp. 479-498, 2007**O. Keren**, "Reduction of Average Path Length in Binary Decision Diagrams by Spectral Methods," in*IEEE Transactions on Computers*, vol. 57, no. 4, pp. 520-531, 2008- B. Abramov,
**O. Keren**, I. Levin and V. Ostrovsky, "Constructing Self-testing Circuits with the Use of Step-by-step (Cascade) Control," in*Automation and Remote Control*, vol. 70, no. 7, pp. 1217–1227, 2009 **O. Keren**, "One-to-many: Context-Oriented Code for Concurrent Error Detection,"*JETTA-Journal of Electronic Testing: Theory and Applications*, vol. 26 no.3, pp. 337-353, 2010**O. Keren**, I. Levin and R. S. Stankovic, "Determining the Number of Paths in Decision Diagrams by Using Auto correlation Coefficients," in*IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems*, vol. 30, no. 1, pp. 31-44, 2011**O. Keren**, I. Levin and R. S. Stankovic, "Linearization of Logic Functions Defined by Disjoint Cubes. I. – Theoretical aspects," in*Automation and Remote Control*, vol. 72, no. 3, pp 615-625, 2011**O. Keren**, I. Levin and R. S. Stankovic, "Linearization of Logic Functions Defined by Disjoint Cubes. II. – Algorithmic Aspects," in*Automation and Remote Control*, vol. 72, no. 4, pp. 818–827, 2011- S. Engelberg and
**O. Keren**, "A Comment on the Karpovsky-Taubin Code," in*IEEE Trans. on Information Theory*, vol. 57, no. 12, pp. 8007-8010, Dec. 2011 **O. Keren**, "Majority Logic Networks: BDD-Based Constructions and Their Minimization", Facta Universitatis,*special issue on Binary and Multiple-Valued Switching Theory and Circuit Design*(submitted Aug 2011)1- S. Engelberg and
**O. Keren**, "An Introduction to Robust Codes over Finite Fields,"*Society for Industrial and Applied Mathematics (SIAM) Review*, vol. 55, no. 4, pp. 751–763, 2013 - I. Levin and
**O. Keren**, " A Generalized If-Then-Else Operator for Representation of Multi Output Functions," in*Mathematical Problems in Engineering*, vol. 2013, Article ID 401616, 13 pages, 2013 - A. Burg and
**O. Keren**, "Universal Hardware for Systems with Acceptable Representations as Low Order Polynomials", in*IEEE Transactions on Circuits and Systems I: Regular Papers*, vol. 61, no. 10, pp. 2878-2887, Oct. 2014 - A. Burg and
**O. Keren**, "On the Efficiency of Berger Codes against Error Injection attacks on parallel asynchronous communication channels", in*Information Security Journal: A Global Perspective.*Special issue on Trustworthy Manufacturing and Utilization, vol. 22, no. 5-6, pp. 208-215, 2013. Published on-line 2014 - I. Shumsky and
**O. Keren**, " Enhancement of Hardware Security by Hamming Ball Based State Assignment", in*Information Security Journal: A Global Perspective.*Special issue on Trustworthy Manufacturing and Utilization, vol. 22, no. 5-6, pp. 216-225, 2013. Published on-line 2014 - I. Levin,
**O. Keren**, V. Sinelnikov, "Improving Hardware Security by Using Hidden Information of Computer systems", in*JNIT: Journal of Next Generation Information Technology*, vol. 4, no. 6, pp. 108- 117, 2013 - Y. Neumeier,
**O. Keren,**"Robust Generalized Punctured Cubic Codes",in*IEEE Trans. on Information theory*, vol. 60, no. 5, pp. 1-10, May 2014 - M. Avital, H. Dagan, I. Levi,
**O. Keren**, and A. Fish, “DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags", in*IEEE Trans. on Circuits and Systems-I,*vol. 62, no.1, pp. 149-156, 2015 - M. Avital, H. Dagan,
**O. Keren**, A. Fish, "Randomized Multitopology Logic Against Differential Power Analysis", in*IEEE Trans. VLSI Syst*. 23(4), pp. 702-711, 2015 **O. Keren**and M. Karpovsky, "Relations between the Entropy of a Source and the Error Masking Probability for Security Oriented Codes", in*IEEE trans. On Communications ,*vol. 63, no. 1, pp. 206-214, 2015- I. Levi,
**O. Keren**, A. Fish, "Data-Dependent Delays as a Barrier Against Power Attacks", in*IEEE Trans. on Circuits and Systems-I*, vol. 62, no. 8, pp. 2269-2278, 2015 - Y. Neumeier, Y. Pesso and
**O. Keren**, "Efficient Implementation of Punctured Parallel Finite Field Multipliers", in*IEEE Trans. on Circuits and Systems-I*, vol. 62, no. 9, pp. 2260-2267, 2015 - Sharon Shetrit, Y. Murin, R. Dabora,
**O. Keren**, "A New Approach to UEP-HARQ via Convolutional Codes", in*IEEE Communications Letters*, 19(12), pp. 2062-2065, 2015. - M. Avital, I. Levi,
**O. Keren**, and A. Fish, “CMOS based Gates for Blurring Power Information ", in*IEEE Trans. on Circuits and Systems-I*, 63-I(7), pp. 1033-1042 , 2016 - S. Engelberg and
**O. Keren**, "Reliable Communications across Parallel Asynchronous Channels with Arbitrary Skews," in*IEEE Trans. on Information Theory*, vol. 63 no. 2, pp. 1120-1129, 2017 - I. Levi, A. Fish and
**O. Keren**"CPA Secured Data-Dependent Delay-Assignment Methodology", in*IEEE Trans. on Circuits and Systems-I*, March 2016, vol. 25 no. 2, pp. 608-620, 2017 - I. Levi, N. Miller, E. Avni,
**O. Keren**and A. Fish, "A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits", in*IEEE Access*, vol. 5, pp. 24797-24809, 2017 - H. Rabii, Y. Neumeier and
**O. Keren**, "High rate robust codes with low implementation complexity", in*IEEE Transactions on Dependable and Secure Computing*, vol. 16, no. 3, pp. 511-520, 1 May-June 2019 - I. Levi,
**O. Keren**and A. Fish, "Low-Cost Pseudo-Asynchronous Circuit Design Style with Reduced Exploitable Side-Information", in*IEEE Transactions on Very Large Scale Integration (VLSI) Systems*, no. 99, pp. 1-14, 2018 - S. Engelberg and
**O. Keren**, "Error-Correcting Codes for Ternary Content Addressable Memories: a New Perspective" in*Information and Control Systems*, no. 1, pp. 68–73, 2018 - Y. Shifman, A. Miller,
**O. Keren**, Y. Weizmann and J. Shor, "A Method to Improve Reliability in a 65nm SRAM PUF Array", in*IEEE Solid-State Circuits Letters*, vol. 1, no. 6, pp. 138-141, June 2018 - R. Giterman, M. Vicentowski, I. Levi, Y. Weizman,
**O. Keren**, and A. Fish, "Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell", in*IEEE Transactions on Very Large Scale Integration Systems*, vol. 26, pp. 2180-2184, Oct. 2018 - R. Giterman,
**O. Keren**and A. Fish, "A 7T Security Oriented SRAM Bitcell," in*IEEE Transactions on Circuits and Systems II: Express Briefs*, vol. 66, no. 8, pp. 1396-1400, Aug. 2019 - H. Rabii and
**O. Keren**, "A New Class of Security Oriented Error Correcting Robust Codes", in*Cryptography and Communications,*11, pp. 965–978, Sep. 2019 - M. Gay, B. Karp,
**O. Keren**and I. Polian, "Toward Error-Correcting Architectures for Cryptographic Circuits Based on Rabii–Keren Codes," in*IEEE Embedded Systems Letters*, vol. 11, no. 4, pp. 115-118, Dec. 2019 - D. Zooker, M. Avital, Y. Weizman, A. Fish and
**O. Keren**, "Silicon Proven 1.8 μm×9.2μm 65-nm Digital Bit Generator for Hardware Security Applications", in*IEEE Transactions on Circuits and Systems II: Express Briefs*, vol. 66, no. 10, pp. 1713-1717, Oct. 2019 - H. Rabii and
**O. Keren**, "A new class of security oriented error correcting robust codes" in*Cryptography and Communications,*vol*.*11, issue 5, pp. 965–978, Sep. 2019 - Y. Neumeier and
**O. Keren**, "On the Existence of Security Enhancing Converter Designs for Multi-Level Memories," in*IEEE Transactions on Circuits and Systems II: Express Briefs*, vol. 67, no. 6, pp. 1119-1123, June 2020 - Y. Shifman, A. Miller,
**O. Keren**, Y. Weizman and J. Shor, "An SRAM-Based PUF With a Capacitive Digital Preselection for a 1E-9 Key Error Probability," in*IEEE Transactions on Circuits and Systems I: Regular Papers*, June 2020 **O. Keren**and I. Polian, "IPM-RED: combining higher-order masking with robust error detection" in*Journal of Cryptographic Engineering,*pp. 1-14*,*June 2020- S. Engelberg and
**O. Keren**, "Constructive Bounds on the Capacity of Parallel Asynchronous Skew-Free Channels With Glitches," in*IEEE Transactions on Information Theory*, vol. 66, no. 7, pp. 4026-4037, July 2020 - M. Gay, B. Karp,
**O. Keren**, et al. "Error control scheme for malicious and natural faults in cryptographic modules",*Journal Cryptogr*Eng (2020) - D. Zooker, O. Ohev Shalom, Y. Weizman, A. Fish and
**O. Keren**, "Toward Secured FPGA: Silicon Proven CLB With Reduced Information Leakage", in*IEEE Solid-State Circuits Letters*, vol. 3, pp. 146-149, 2020. - Y. Shifman, A. Miller,
**O. Keren**, Y. Weizman and J. Shor, "A Method to Utilize Mismatch Size to Produce an Additional Stable Bit in a Tilting SRAM-Based PUF" in*IEEE Access*, vol. 8, pp. 219137-219150, 2020. - Y. Weizman, R. Giterman, O. Chertkow, M. Vizentovski, I. Levi, I. Sever, I. Kehati,
**O. Keren**, and A. Fish, "Low-Cost Side-Channel Secure Standard 6T SRAM Based Memory with a 1% Area and less than 5% Latency and Power Overheads" -*IEEE Access*, 2021

**Papers in refereed proceedings**

**O. Keren**and S. Litsyn, “MDS codes correcting erasures," T*he 2nd Mediterranean workshop on Coding and Information Integrity*, Palma de Mallorca, Spain, 1996**O. Keren**and S. Litsyn, “A class of array codes correcting multiple column erasures,"*the 19th Convention of Electrical and Electronics Engineers in Israel*. Jerusalem, Israel, pp. 336-339, 1996**O. Keren**and S. Litsyn, “Codes correcting phased burst errors,"*IEEE Information theory workshop*, Longyearbyen, Norway, 1997**O. Keren**and S. Litsyn, “On spectra of BCH codes,"*The 3rd Mediterranean workshop on coding and information integrity,*Ein Boqeq, Israel, 1997**O. Keren**and S. Litsyn, “On the distance distribution of BCH codes,"*IEEE International Symposium on Information Theory*, MIT, Cambridge, MA USA, p.463, 1998**O. Keren**and S. Litsyn, "A lower bound on the probability of decoding error over a BSC channel,"*The 21st IEEE Electrical and Electronic Engineers in Israel,*pp. 271-273, 2000**O. Keren**, "Low Complexity Linear Decomposition at the Disjoint Cubes Domain,"*WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications*, Madrid, Spain, pp. 176-181, 2006- I. Levin,
**O. Keren**, G. Kolotov and M. Karpovsky, "Piecewise linearization of logic functions," in*Proc. of the 2006 International Workshop on Spectral Methods and Multirate Signal Processing*, pp. 345-353, 2006 **O. Keren**, I. Levin and R. S. Stankovic, "Reduction of the Number of Paths in Binary Decision Diagrams by Linear Transformation of Variables" , in*Proc. of the 7th International Workshop on Boolean Problems,*pp. 79-84, Freiberg, Germany, 2006- I. Levin, V. Ostrovsky,
**O. Keren**and V. Sinelnikov, "Cascade Scheme for Concurrent Errors Detection,"*The 9th EUROMICRO Conference on Digital System Design (DSD'06)*, pp. 359-368, 2006 **O. Keren**, I. Levin and R. S. Stankovic, "Linearization of Functions Represented as a Set of Disjoint Cubes at the Autocorrelation Domain," in*Proc. of the 7th International Workshop on Boolean Problems*, pp. 137-144, Freiberg, Germany, 2006.- I. Levin,
**O. Keren**, V. Ostrovsky and G. Kolotov, "Concurrent Decomposition of Multi-terminal BDDs,"*The 7th International Workshop on Boolean Problems*, pp. 129-136, Freiberg, Germany, 2006 **O. Keren**, I. Levin and R. S. Stankovic, “Use of Gray Decoding for Implementation of Symmetric Functions,” in*Proc. of the VLSI-SoC 2007*, pp.25-30, Atlanta U.S.A., 2007**O. Keren**, I. Levin and M. Karpovsky, "Non-redundant Scheme for Arbitrary Error Detection in Combinational Circuits,"*IFIP/IEEE VLSI-SoC - International Conference on Very Large Scale Integration*, pp. 575-580, 2008- V. Ostrovsky,
**O. Keren**and I. Levin, "Designing of QCA Schemes by Boundary Functions,"*8th International Workshop on Boolean Problems,*pp. 67-73, Freiberg, Germany, 2008 - I. Levin and
**O. Keren**, "Split Multi-terminal Binary Decision Diagrams,"*The 8th International Workshop on Boolean Problems*, pp. 161-167, Freiberg, Germany, 2008 **O. Keren**, I. Levin, V. Ostrovsky, and B. Abramov, "Arbitrary Error Detection in Combinational Circuits by using Partitioning,"*The 23rd IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'08)*, pp. 361-369, 2008- V. Ostrovsky,
**O. Keren**and I. Levin, "Programmable Comparators Based Array for Regular QCA Implementation,"*International Workshop on Design and Test of Nano Devices, Circuits and Systems (IEEE NDCS'08)*, pp. 39-42, 2008 - S. Baranov, I. Levin,
**O. Keren**, and M. Karpovsky, "Designing Fault Tolerant FSM by Nano-PLA,"*IEEE International On-Line Testing Symposium (IOLTS 2009)*, pp. 229-234, Sesimbra-Lisbon, Portugal, 2009 **O. Keren**, I. Levin, and M. Karpovsky, "Duplication Based One-to-many Coding for Trojan HW Detection,"*IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'10)*, pp. 160-166, 2010- I. Levin and
**O. Keren**, "Transforming FSMs for Synthesis by Fault Tolerant Nano-PLAs," 9th International Workshop on Boolean Problems, pp. 75-82, Freiberg, Germany, 2010 **O. Keren**, "Adaptive Hardware Based on the Inverse WalshTransform," Reed-Muller workshop, pp. 21-26, Finland, 2011**O. Keren**, I. Levin and V. Sinelnikov, "Detection of Trojan HW by using hidden information on the system,"*IEEE International On-Line Testing Symposium (IOLTS 2011)*, pp. 194-195, 2011.- I. Levin and
**O. Keren**, "Generalized If-Then-Else Operator for Compact Polynomial Representation of Multi Output Functions,"*The 14th EUROMICRO Conference on Digital System Design (DSD'11)*, pp. 15-20, 2011 - Y. Neumeier and
**O. Keren**, '' Punctuated Karpovsky-Taubin Binary Robust Error Detecting Codes for Cryptographic Devices,''*IEEE International On-Line Testing Symposium*, pp. 156-161, Sitges, Spain, 2012 - A. Burg and
**O. Keren**, ''Functional Level Embedded Self-Testing for Walsh Transform Based Adaptive Hardware'' ,*IEEE International On-Line Testing Symposium*, pp. 134-135, Sitges, Spain, 2012 - A. Burg,
**O. Keren**and I. Levin, Functional Testing of Boolean Systems with Unknown Functionality",*10th International Workshop on Boolean Problems, pp. 25-32,*Freiberg, Germany, 2012 - Y. Manzor adn
**O. Keren**, "Amalgamated Codes for Flash Memories",*IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'12),*Texas, 2012. - N. Admaty, S. Litsyn and
**O. Keren**, "Puncturing, Expurgating and Expanding the q-ary BCH Based Robust Codes",*IEEE 27th Convention of Electrical & Electronics Engineers in Israel (IEEEI 2012)* - I. Shumsky,
**O. Keren**and M. Karpovsky, "Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of Codewords",*Dependable Computing and Communications Symposium at the International Conference on Dependable Systems and Networks, DSN-DCCS*, pp. 25-30, August 2013 - I. Shumsky and
**O. Keren**, "Security-Oriented State Assignment", TRUDEVICE, The 1st Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, May 2013. - A. Burg and
**O. Keren**, "On the Robustness of Berger Codes Against Error Injection Attacks",*TRUDEVICE, The 1st Workshop on Trustworthy Manufacturing and Utilization of Secure Devices*, May 2013 - Y. Neumeier and
**O. Keren**, “A New Efficiency Criterion for Security Oriented Error Correcting Codes”,*19th IEEE European Test Symposium,*Germany, May - V. Tomashevich, Y. Neumeier, R. Kumar,
**O. Keren**and I. Polian, "Protecting Cryptographic Hardware against Malicious Attacks by Nonlinear Robust Codes",*The IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'14),*pp. 40-45, Amsterdam, October 2014 - S. Engelberg and
**O. Keren**, "Zero-Latency Zero-Error Codes for Parallel Asynchronous Channels with Arbitrary Skews" ,*IEEE Information Theory Workshop (ITW)*, pp. 1-4, Israel, 2015 - Y. Neumeier and
**O. Keren**, "Expurgated Codes for Detecting Jamming in q-ary Memories",*The Ninth International Conference on Dependability*, DEPEND 2016 - H. Rabii, Y. Neumeier and
**O. Keren**, "Low Complexity High Rate Robust Codes Derived from the Quadratic-Sum Code",*International Workshop on Boolean Problems (IWBP)*, 2016 - H. Rabii, Y. Neumeier and
**O. Keren**, "Low Complexity High Rate Robust Codes",*TRUDEVICE workshop*, Barcelona, Nov. 2016 - B. Karp, Y. Berkowitz, and
**O. Keren**, "Jamming Resistant Encoding For Non-Uniformly Distributed Information",*IOLTS*2017 - S. Engelberg and
**O. Keren**, "Reliable Communication across Parallel Asynchronous Channels with Glitches",*5ICMCTA*, August 2017 - H. Rabii and
**O. Keren**, "A New Construction of Minimum Distance Robust Codes",*5ICMCTA*, August 2017 - D. Zooker, M. Wicentowski, Y. Weizman, A. Fish, and
**O. Keren**, "Vulnerability of Secured IoT Memory Against Localized Back Side Laser Fault Injection",*Seventh IEEE International Conference on Emerging Security Technologies - EST 2017* - B. Karp, M.Gay,
**O. Keren**and I. Polian, "Security-oriented Code-based Architectures for Mitigating Fault Attacks",*Design of Circuits and Integrated Systems (DCIS)*, Lyon, 14th-16th November 2018 - B. Karp, M. Gay,
**O. Keren**and I. Polian, "Detection_and_Correction_of_Malicious_and_Natural_Faults_in_Cryptographic_Modules (2)",*The 7th International Workshop on Security Proofs for Embedded Systems (PROOFS)*, Amsterdam, September 13th, 2018 - R. Giterman,
**O. Keren**, and A. Fish, "Improving the Security of a 6T SRAM using Body-Biasing in 28 nm FD-SOI",*the 2018 IEEE S3S Conference*, October 2018 - A. Miller, Y. Shifman, Y. Weizman,
**O. Keren**and J. Shor, "A Highly Reliable SRAM PUF with a Capacitive Preselection Mechanism and pre-ECC BER of 7.4E-10,"*2019 IEEE Custom Integrated Circuits Conference (CICC)*, pp. 1-4, Austin, TX, USA, 2019 - D. Zooker, A. Fish,
**O. Keren**and Y. Weizman, "Compact Sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security Applications,"*2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)*, pp. 1-5, CANARY ISLANDS, Spain, 2019 - Y. Rudin, I. Levi, A. Fish and
**O. Keren**, "FPGA Implementation of pAsynch Design Paradigm,"*2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)*, pp. 1-5, CANARY ISLANDS, Spain, 2019 - B. Karp, O. Amrani and
**O. Keren**, "Nonlinear Product Codes for Reliability and Security,"*2019 IEEE 4th International Verification and Security Workshop (IVSW)*, pp. 13-18, Rhodes Island, Greece, 2019 - H. Martin, E. Vatajelu, G. Di Natale and
**O. Keren**, "On the Reliability of the Ring Oscillator Physically Unclonable Functions,"*2019 IEEE 4th International Verification and Security Workshop (IVSW)*, pp. 25-30, Rhodes Island, Greece, 2019 **O. Keren**and I. Polian, "A comment on information leakage from robust code-based checkers detecting fault attacks on cryptographic primitives",*Proceedings of 8th International Workshop*, v. 11, pp. 49-63, Sep. 2019- R. Giterman, M. Wicentowski, O. Chertkow, I. Sever, I. Kehati, Y. Weizman,
**O. Keren**and A. Fish, "Power Analysis Resilient SRAM Design Implemented with a 1% Area Overhead Impedance Randomization Unit for Security Applications,"*ESSCIRC 2019 - IEEE 45th European Solid State Circuits Conference (ESSCIRC)*, pp. 69-72, Cracow, Poland, 2019 - D. Zooker, M. Elkoni, O. Ohev Shalom, Y. Weizman, I. Levi,
**O. Keren**and A. Fish, "Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks"*2020 IEEE International Symposium on Circuits and Systems (ISCAS)*, Seville, Spain, 2020

**Compendium of New Refereed Papers:**

**O. Keren**, I. Levin and R. S. Stankovic, "Use of Gray Coding for Implementation of Symmetric Functions,"*VLSI-SoC: Advanced Topics on Systems on Chip, Series: Advances in Information and Communication Technology*, Vol. 291, Ricardo Reis, Vincent Mooney, Paul Hasler (Eds.) Springer, pp. 17-32, 2009- A. Burg,
**O. Keren**, I. Levin, "Blind Testing of Polynomials by Linear Checks",*Recent Progress in the Boolean Domain*, Edited by Bernd Steinbach, Cambridge Scholars Publishing , pp. 322-346, April 2014 - H. Rabii, Y. Neumeier and
**O. Keren**, "Low Complexity High Rate Robust Codes",*Further Improvements in the Boolean Domain*, Edited by Bernd Steinbach, Cambridge Scholars Publishing, pp. 303-313, 2017

**Other publications**

**O. Keren**and I. Levin "Linearization of the Logic Functions Defined in SOP Form," UROMICRO SEAA / DSD 2005, Porto (Portugal), work in progress, 2005- B. Abramov,
**O. Keren**and I. Levin, "Teaching Cognitive-Inspired Design of Sequential Circuits," The 8th European Workshop on Microelectronics Education, Darmstadt, Germany, 2010. **O. Keren**and I. Levin, "Transforming Fault Tolerant Implementation of FSMs by Dense Nano-PLA," IEEE East-West Design & Test Symposium (EWDTS), 2010.- Y. Neumeier and
**O. Keren**, "A New Efficiency Criterion for Error Correcting Robust codes",*Trustworthy Manufacturing and Utilization of Secure Devices workshop*, Freiburg, Dec. 2013. (poster) - Pesso, Y. Neumeier and
**O. Keren**, "Efficient Implementation of Checkers for Punctured Cubic Codes",*Trustworthy Manufacturing and Utilization of Secure Devices workshop*, Freiburg, Dec. 2013 **O. Keren**, "Security Oriented Codes",*IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI 2014).*(Invited talk.)- Haber, B. Frankel, M. Avital, I. Levi,
**O. Keren**and A. Fish, "Practical design-knobs while performing Power Analysis",*TRUDEVICE*2014 - Sklavos, J. C. Resende, R. Chaves, F. Regazzoni and
**O. Keren**, "Efficiency of Cryptography for Multi-Algorithm Computation on Dedicated Structures", International Conference on Modern Circuits and Systems Technologies 2015 (MOCAST'15), Thessaloniki, Greece; 05/2015. (Invited paper) - Y. Neumeier and
**O. Keren**, "Protecting Multilevel Memories from Fault Attacks Using Robust Codes",*TRUDEVICE*2015 **O. Keren**, "Security oriented codes: attacks and countermeasures", Schloss Dagstuhl on "Hardware Security", Germany May 16 to May 20, 2016- I. Levi,
**O. Keren**, A.Fish, "Data-Dependent Delays As a Barrier Against Power Attacks", TCAS Special: C*ryptography & Security II Session, IEEE International symposium on circuits and systems, ISCAS 2016,*May 22-25, Baltimore, USA - M. Avital, H. Dagan,
**O. Keren**and A. Fish, "Randomized Multi-Topology Logic Against Differential Power Analysis", TCAS Special: Cryptography & Security II Session, IEEE International symposium on circuits and systems, ISCAS 2016, May 22-25, Baltimore, USA. - M. Avital, H. Dagan, I. Levi,
**O. Keren**and A. Fish, "DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes",*TCAS Special: Cryptography & Security II Session, IEEE International symposium on circuits and systems, ISCAS 2016*, May 22-25, Baltimore, USA **O. Keren**, I. Polian and M. Tehranipoor, Hardware Security (Dagstuhl Seminar 16202). Dagstuhl Reports 6(5), pp. 72-93, 2016- M. Avital, A. Fish and
**O. Keren**, " From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures", TRUDEVICE workshop, Barcelona, Nov. 2016 - Y. Weizman, B. Karp and
**O. Keren**, "Modeling SRAM cell stability for randomness evaluation of PUF cells",*TRUDEVICE workshop,*Barcelona, Nov. 2016 - Y. Neumeier and
**O. Keren**, "Robust Error Detecting Codes for Detecting Fault Injections in Multilevel Memories",*TRUDEVICE workshop*, Barcelona, Nov. 2016 - S. Engelberg and
**O. Keren**, "Trustworthy Communications across Parallel Asynchronous Channels with Glitches",*TRUDEVICE workshop*, Barcelona, Nov. 2016 - Y. Neumeier and
**O. Keren**, "Robust Error Detecting Codes for Multilevel Memories",*International conference on the science of electrical engineering (ICSEE)*,Nov. 2016 - I. Levi, A. Fish and
**O. Keren**, "Security Aware Pseudo-Asynchronous Circuit Design Style",*2nd International Verification and Security Workshop (IVSW)*, Thessaloniki Greece, July 2017 - D. Zooker , I. Levi, A. Fish and
**O. Keren**, "Secured Dual-Rail-Precharge Mux-Based (DPMUX) Symmetric-Logic for Low Voltage Applications",*the 2017 IEEE S3S Conference*, October 2017 - H. Rabii, Y. Neumeier and
**O. Keren**, "Compact Protection Codes",*ISVW 2018*, Costa-Brava, July 2018 - M. Gay, B. Karp,
**O. Keren**and I. Polian, " On Security Metrics for Evaluating Fault-injection Countermeasures",*TRUDEVICE*, March 2018 - I. Levi, Y. Rudin, A. Fish, and
**O. Keren**, "Embedded Randomness and Data Dependencies Design Paradigm: Advantages and Challenges",*DATE 2018*, pp. 395-400, Dresden, Germany, March 2018 (Invited talk) - G. Di Natale and
**O. Keren**, "Nonlinear Codes for Control Flow Checking",*TRUDEVICE*, March 2018 - M. Avital, A. Mordakhay, D. Zooker , Y. Weizman, A. Fish and
**O. Keren**, "Utilization of Process and Supply Voltage Random Variations for Random Bit Generation",*the IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2018)*, China, 2018

**Thesis Publications**

- Doctoral thesis: "Algebraic coding for computer systems".
- Master's thesis: "The capacity of TD-QAGC under minimum maximum and average power constraints".