Publications

  • J. Dworak, A. Crouch, J. Potter, A. Zygmontowicz and M. Thornton, Don’t Forget to Lock your SIB: hiding instruments using P1687, in proc. 2013 IEEE International Test Conference (ITC), Anaheim CA, pp. 110 (Paper)
  • Marie Vasek, Micah Thornton, and Tyler Moore.  Empirical Analysis of Denial-of- Service Attacks in the Bitcoin ecosystem, in proc. 1st workshop on Bitcoin Research, Volume 8438 of Lecture Notes in Computer Science, Springer March 2014, pp 57-71 ( Paper ) ( Press Release )
  • F. Zhang, M. Thornton, and J. Dworak, When Optimized N-Detect test sets are Biased: Investigation of Cell-Aware Type Faults and N-Detect Stuck-at ATPG, in proc 2014 IEEE 23rd North Atlantic Test Workshop (NATW), Johnson City NY, 2014 pp 32-39
  • Micah Thornton and Mitchell Thornton. On the relationship of Boolean Function Spectra and Circuit Output Probabilities, in proc. International Workshop on Boolean Problems (IWSBP) September 2014 pp 32-39
  • Micah Thornton, Randomness Properties of Cryptographic Hash Functions, Southern Methodist University Masters Thesis (Presented 2017).( thesis-1xpvods )
  • Micah Thornton and Mitchell Thornton,   Multiple Valued Random Digit Extraction, ISMVL 2018 in proc. (Paper)
  • Micah Thornton, Spectral Invariance of Genomic Similarity Metrics, ISMVL 2019 in proc. (Paper)

Comments are closed.