42 results on '"Hardware obfuscation"'
Search Results
2. Hardware obfuscation for IP protection
3. A Unified Methodology for Hardware Obfuscation and IP Watermarking
4. Hardware Obfuscation
5. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks
6. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
7. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
8. Ephemeral Key-based Hybrid Hardware Obfuscation
9. Hardware Obfuscation: Techniques and Open Challenges
10. VLSI Test and Hardware Security Background for Hardware Obfuscation
11. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
12. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
13. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
14. Split-Fabric: A Novel Wafer-Scale Hardware Obfuscation Methodology using Silicon Interconnect Fabric
15. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT
16. Hardware Obfuscation of Digital FIR Filters
17. Hardware Obfuscation for IP Protection of DSP Applications
18. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher
19. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art
20. Preventing DNN Model IP Theft via Hardware Obfuscation
21. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study
22. SAT-Attack Resistant Hardware Obfuscation using Camouflaged Two-Dimensional Heterostructure Devices
23. Hardware Obfuscation Techniques on FPGA-Based Systems
24. Hardware Obfuscation and Logic Locking: A Tutorial Introduction
25. Hardware Obfuscation Using High Level Aggregation
26. An Orthogonal Algorithm for Key Management in Hardware Obfuscation
27. On the Construction of Composite Finite Fields for Hardware Obfuscation
28. Key Generation for Hardware Obfuscation Using Strong PUFs
29. Hardware Obfuscation of AES through Finite Field Construction Variation
30. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units
31. Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
32. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation
33. A Perceptron-Inspired Technique for Hardware Obfuscation
34. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level
35. On the Difficulty of FSM-based Hardware Obfuscation
36. A hardware obfuscation technique for manufacturing a secure 3D IC
37. Hardware Obfuscation Using Strong PUFs
38. Development and Evaluation of Hardware Obfuscation Benchmarks
39. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
40. Comparative Analysis of Hardware Obfuscation for IP Protection
41. Development of a Layout-Level Hardware Obfuscation Tool
42. Hardware obfuscation using PUF-based logic
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.