36 results on '"Hardware obfuscation"'
Search Results
2. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks.
3. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach.
4. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification.
5. Hardware Obfuscation of Digital FIR Filters.
6. Hardware Obfuscation for IP Protection of DSP Applications.
7. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher.
8. Hardware Obfuscation Techniques on FPGA-Based Systems.
9. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study.
10. Preventing DNN Model IP Theft via Hardware Obfuscation.
11. Hardware Obfuscation of Digital FIR Filters.
12. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
13. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.
14. A Unified Methodology for Hardware Obfuscation and IP Watermarking.
15. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units.
16. Hardware Obfuscation of AES through Finite Field Construction Variation.
17. An Orthogonal Algorithm for Key Management in Hardware Obfuscation.
18. Hardware Obfuscation and Logic Locking: A Tutorial Introduction.
19. A Perceptron-Inspired Technique for Hardware Obfuscation.
20. A hardware obfuscation technique for manufacturing a secure 3D IC.
21. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation.
22. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level.
23. Hardware Obfuscation Using Strong PUFs.
24. On the Construction of Composite Finite Fields for Hardware Obfuscation.
25. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications.
26. Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs.
27. Comparative Analysis of Hardware Obfuscation for IP Protection.
28. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans.
29. Development and Evaluation of Hardware Obfuscation Benchmarks.
30. On the Difficulty of FSM-based Hardware Obfuscation.
31. Development of a Layout-Level Hardware Obfuscation Tool.
32. Hardware obfuscation using PUF-based logic.
33. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation.
34. Key Generation for Hardware Obfuscation Using Strong PUFs.
35. On the Difficulty of FSM-based Hardware Obfuscation.
36. Blockchain-enabled Cryptographically-secure Hardware Obfuscation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.