Search

Your search keyword '"Hardware obfuscation"' showing total 194 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
194 results on '"Hardware obfuscation"'

Search Results

2. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

12. On the Difficulty of FSM-based Hardware Obfuscation

16. Key Generation for Hardware Obfuscation Using Strong PUFs

18. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification.

21. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.

22. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.

25. On the Construction of Composite Finite Fields for Hardware Obfuscation.

26. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

27. A Novel Probability-Based Logic-Locking Technique: ProbLock

28. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

29. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection.

30. Tunnel FET‐based ultralow‐power and hardware‐secure circuit design considering p‐i‐n forward leakage.

31. Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis.

32. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking.

33. Hardware Trojans Detection and Prevention Techniques Review.

34. Graph Similarity and its Applications to Hardware Security.

35. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design.

36. Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction.

37. Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity.

38. An Overview of FPGA-inspired Obfuscation Techniques.

39. Hiding in Plain Sight: Reframing Hardware Trojan Benchmarking as a Hide&Seek Modification.

40. LOTUS: A Scalable Framework to Lock Multimodule Designs With One-Time Self-Destructing Key.

42. Hardware Protection via Logic Locking Test Points.

43. Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors.

44. Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation.

45. A robust deep learning attack immune MRAM-based physical unclonable function.

47. A Novel Probability-Based Logic-Locking Technique: ProbLock.

48. Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis

49. Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection.

50. Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques.

Catalog

Books, media, physical & digital resources