Results 201 to 210 of about 10,775 (222)
Some of the next articles are maybe not open access.
Key-based Obfuscation of Digital Design for Hardware Security
Advances in Intelligent Systems and Computing, 2022Deepthi Amuru
exaly
LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022Abdulrahman Alaql +2 more
exaly
Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
IEEJ Transactions on Industry Applications, 2019Yuumi Matsuoka +2 more
openaire +1 more source
Hardware obfuscation using PUF-based logic
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014James B. Wendt, Miodrag Potkonjak
openaire +1 more source
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
Journal of Electronic Testing: Theory and Applications (JETTA), 2011Rajat Subhra Chakraborty, Swarup Bhunia
exaly
Securing Hardware Accelerators Using Multi-Key Based Structural Obfuscation
IEEE Letters of the Computer Society, 2020Anirban Sengupta, Mahendra Rathor
exaly
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
IACR Cryptol. ePrint Arch., 2019Fatemeh Ganji +3 more
openaire +2 more sources
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2009Rajat Subhra Chakraborty, Swarup Bhunia
exaly

