Search

Your search keyword '"Hardware obfuscation"' showing total 4 results

Search Constraints

Start Over You searched for: Descriptor "Hardware obfuscation" Remove constraint Descriptor: "Hardware obfuscation" Journal ieee transactions on computers Remove constraint Journal: ieee transactions on computers
4 results on '"Hardware obfuscation"'

Search Results

1. On the Construction of Composite Finite Fields for Hardware Obfuscation.

2. Graph Similarity and its Applications to Hardware Security

3. On the Construction of Composite Finite Fields for Hardware Obfuscation

4. Fault Analysis-Based Logic Encryption

Catalog

Books, media, physical & digital resources