Results 231 to 240 of about 63,047 (284)

Exploring the computing power of microbes that shapes the environment. [PDF]

open access: yesCurr Opin Microbiol
Rocha CK   +5 more
europepmc   +1 more source

Coherent optical interconnects using Fermat number transform and hollow core fibre. [PDF]

open access: yesCommun Eng
Chen S   +12 more
europepmc   +1 more source

Trace Logic Locking: Improving the Parametric Space of Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin our work by deriving a fundamental tradeoff between these two goals which exists underlying all logic locking, regardless of ...
Michael Zuzak, Yuntao Liu
exaly   +2 more sources

Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access.
Nimisha Limaye   +2 more
exaly   +2 more sources

Keynote: A Disquisition on Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
The fabless business model has given rise to many security threats, including piracy of intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and hardware Trojans (HT). Such threats severely undermine the benefits of the fabless model.
Abhishek Chakraborty   +2 more
exaly   +2 more sources

LOOPLock: Logic Optimization-Based Cyclic Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
SAT Attack, CycSAT, and Removal Attack have demonstrated their abilities to break most existing logic locking methods. In this article, we propose a new cyclic logic locking method to invalidate these attacks simultaneously. Our main intention is to create noncombinational cycles to lock a circuit.
Hsiao-Yu Chiang   +2 more
exaly   +2 more sources

Logic Locking

2023
Dominik Sisejkovic, Rainer Leupers
exaly   +2 more sources

Physically Secure Logic Locking With Nanomagnet Logic

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Alexander J Edwards   +2 more
exaly   +2 more sources

Home - About - Disclaimer - Privacy