Search

Your search keyword '"Hardware obfuscation"' showing total 147 results

Search Constraints

Start Over You searched for: Descriptor "Hardware obfuscation" Remove constraint Descriptor: "Hardware obfuscation"
147 results on '"Hardware obfuscation"'

Search Results

1. LOTUS: A Scalable Framework to Lock Multimodule Designs With One-Time Self-Destructing Key.

2. A Framework for Data Protection of Embedded Systems in IoT Applications

3. Advances in Logic Locking

5. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

6. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking.

8. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.

9. Obfuscated AES cryptosystem for secure medical imaging systems in IoMT edge devices.

10. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.

11. Hardware Obfuscation for IP Protection of DSP Applications.

12. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

13. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art.

14. UNSAIL : Thwarting Oracle-Less Machine Learning Attacks on Logic Locking.

15. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

18. Logic Encryption

21. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection.

22. Tunnel FET‐based ultralow‐power and hardware‐secure circuit design considering p‐i‐n forward leakage.

23. A Novel Probability-Based Logic-Locking Technique: ProbLock

26. On the Construction of Composite Finite Fields for Hardware Obfuscation.

27. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

28. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking

29. On the Difficulty of FSM-based Hardware Obfuscation

31. Hybrid Protection of Digital FIR Filters

32. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

33. Preventing DNN Model IP Theft via Hardware Obfuscation

34. Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks

35. Hardware Security Exploiting Post-CMOS Devices: Fundamental Device Characteristics, State-of-the-Art Countermeasures, Challenges and Roadmap

36. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging

37. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

38. Security of Microfluidic Biochip

39. Graph Similarity and its Applications to Hardware Security

40. Tunnel FET‐based ultralow‐power and hardware‐secure circuit design considering p‐i‐n forward leakage

41. On the Construction of Composite Finite Fields for Hardware Obfuscation

44. High-level Intellectual Property Obfuscation via Decoy Constants

45. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

46. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

47. SAT-attack Resilience Measure for Access Restricted Circuits

48. SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing

49. Top-down Physical Design of Soft Embedded FPGA Fabrics

50. Hardware Redaction via Designer-Directed Fine-Grained eFPGA Insertion

Catalog

Books, media, physical & digital resources