skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Roy, S"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available April 30, 2026
  2. Free, publicly-accessible full text available March 19, 2026
  3. Abstract Magnetic reconnection is a fundamental process in space and astrophysical plasmas that converts magnetic energy to particle energy. Recently, a novel kind of reconnection, called electron-only reconnection, has been observed in Earth's magnetosheath plasma. A defining characteristic of electron-only reconnection is that electron jets are observed but ion jets are absent. This is in contrast with traditional ion-coupled reconnection, where both ions and electrons exhibit outflowing velocity jets. Findings from the Magnetospheric Multiscale mission observations and particle-in-cell simulations show clear signatures of electron heating in electron-only reconnection events, while ions are not heated or cooled in these events. This result is unlike ion-coupled reconnection, where both ions and electrons are heated to varying degrees. The ratio of electron to ion dissipation increases with the local magnetic curvature, indicating that the partition of heat into ions and electrons is dependent on the current-sheet thickness. 
    more » « less
  4. On-chip assets, such as cryptographic keys, intermediate cipher computations, obfuscation keys, and hardware security primitive outputs, are usually stored in volatile memories, e.g., registers and SRAMs. Such volatile memories could be read out using active physical attacks, such laser-assisted side-channels. One way to protect assets stored in volatile memories can be the employment of sensors that detect active physical attacks and trigger complete zeroization of sensitive data. However, hundreds or thousands of clock cycles are often needed to accomplish this. Further, the sensing and self-destruction mechanisms are decoupled from the sensitive circuitry and can be disabled separately by an adversary. Moreover, defensive actions (e.g., zeroization) may be disabled by bringing the CPU/SoC into an inoperable condition, while registers may still hold their data, making them susceptible. This paper proposes a self-destructive latch to protect sensitive data from active side-channel attacks, which require supply voltage manipulations.Our proposed latch senses supply voltage interference required during such attacks, and reacts instantaneously by entering a forbidden data state, erasing its stored data. The design uses a NULL convention logic (NCL)- based polymorphic NOR/NAND gate, which changes its functionality with supply voltage. Our results show that the latch is stable across temperature and process variation reacting to attacks with 91% confidence. Even for the 9% where data is not destroyed, in 3.33% of cases data flips its state which makes reliable extraction difficult for an attacker. The polymorphic latch is straightforward to implement due to its NCL implementation and the voltage for the self-destructive behavior is easily altered by resizing only two transistors. Further, this self-destructive behavior extends to registers which are built out of latches. 
    more » « less
  5. Free, publicly-accessible full text available December 31, 2025