Search

Your search keyword '"Hardware obfuscation"' showing total 145 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Topic hardware obfuscation Remove constraint Topic: hardware obfuscation
145 results on '"Hardware obfuscation"'

Search Results

2. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

5. On the Difficulty of FSM-based Hardware Obfuscation

6. Preventing DNN Model IP Theft via Hardware Obfuscation

8. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

9. On the Construction of Composite Finite Fields for Hardware Obfuscation

10. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.

11. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

12. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

15. Hardware obfuscation for IP protection

16. Development and Evaluation of Hardware Obfuscation Benchmarks

17. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study

18. Hardware Obfuscation Techniques on FPGA-Based Systems

19. Key Generation for Hardware Obfuscation Using Strong PUFs

20. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units

21. Hardware Obfuscation of AES through Finite Field Construction Variation

22. An Orthogonal Algorithm for Key Management in Hardware Obfuscation

23. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level

24. Hardware Obfuscation Using Strong PUFs

28. A Unified Methodology for Hardware Obfuscation and IP Watermarking

29. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

30. A hardware obfuscation technique for manufacturing a secure 3D IC

31. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

32. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

33. A Framework for Data Protection of Embedded Systems in IoT Applications

34. Advances in Logic Locking

35. On the Construction of Composite Finite Fields for Hardware Obfuscation.

36. On the Difficulty of FSM-based Hardware Obfuscation

37. Comparative Analysis of Hardware Obfuscation for IP Protection

38. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation

39. VLSI Test and Hardware Security Background for Hardware Obfuscation

40. Development of a Layout-Level Hardware Obfuscation Tool

41. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.

42. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art.

46. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

47. A Novel Probability-Based Logic-Locking Technique: ProbLock

48. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

Catalog

Books, media, physical & digital resources