Results 231 to 240 of about 63,047 (284)
Exploring the computing power of microbes that shapes the environment. [PDF]
Rocha CK +5 more
europepmc +1 more source
Coherent optical interconnects using Fermat number transform and hollow core fibre. [PDF]
Chen S +12 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Trace Logic Locking: Improving the Parametric Space of Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin our work by deriving a fundamental tradeoff between these two goals which exists underlying all logic locking, regardless of ...
Michael Zuzak, Yuntao Liu
exaly +2 more sources
Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access.
Nimisha Limaye +2 more
exaly +2 more sources
Keynote: A Disquisition on Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020The fabless business model has given rise to many security threats, including piracy of intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and hardware Trojans (HT). Such threats severely undermine the benefits of the fabless model.
Abhishek Chakraborty +2 more
exaly +2 more sources
LOOPLock: Logic Optimization-Based Cyclic Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020SAT Attack, CycSAT, and Removal Attack have demonstrated their abilities to break most existing logic locking methods. In this article, we propose a new cyclic logic locking method to invalidate these attacks simultaneously. Our main intention is to create noncombinational cycles to lock a circuit.
Hsiao-Yu Chiang +2 more
exaly +2 more sources
Physically Secure Logic Locking With Nanomagnet Logic
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsAlexander J Edwards +2 more
exaly +2 more sources

