Results 201 to 210 of about 10,775 (222)
Some of the next articles are maybe not open access.

Hardware Obfuscation and Logic Locking

2021
Md Moshiur Rahman, Swarup Bhunia
openaire   +1 more source

Key-based Obfuscation of Digital Design for Hardware Security

Advances in Intelligent Systems and Computing, 2022
Deepthi Amuru
exaly  

LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
Abdulrahman Alaql   +2 more
exaly  

Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM

IEEJ Transactions on Industry Applications, 2019
Yuumi Matsuoka   +2 more
openaire   +1 more source

Hardware obfuscation using PUF-based logic

2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014
James B. Wendt, Miodrag Potkonjak
openaire   +1 more source

Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques

IEEE Transactions on Information Forensics and Security, 2017
Arunkumar Vijayakumar   +2 more
exaly  

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

Journal of Electronic Testing: Theory and Applications (JETTA), 2011
Rajat Subhra Chakraborty, Swarup Bhunia
exaly  

Securing Hardware Accelerators Using Multi-Key Based Structural Obfuscation

IEEE Letters of the Computer Society, 2020
Anirban Sengupta, Mahendra Rathor
exaly  

Blockchain-enabled Cryptographically-secure Hardware Obfuscation

IACR Cryptol. ePrint Arch., 2019
Fatemeh Ganji   +3 more
openaire   +2 more sources

HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2009
Rajat Subhra Chakraborty, Swarup Bhunia
exaly  

Home - About - Disclaimer - Privacy