592 results on '"Hardware obfuscation"'
Search Results
2. Hardware Obfuscation of Digital FIR Filters
3. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
4. Protecting the Intellectual Property of Binary Deep Neural Networks With Efficient Spintronic-Based Hardware Obfuscation.
5. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
6. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks.
7. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification.
8. Hardware Obfuscation of Digital FIR Filters.
9. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation
10. Development and Evaluation of Hardware Obfuscation Benchmarks
11. Hardware Obfuscation for IP Protection of DSP Applications.
12. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher.
13. Hardware Obfuscation Techniques on FPGA-Based Systems.
14. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study.
15. Preventing DNN Model IP Theft via Hardware Obfuscation.
16. Hardware Obfuscation and Logic Locking
17. Hardware obfuscation for IP protection
18. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
19. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.
20. On the Difficulty of FSM-based Hardware Obfuscation
21. A Unified Methodology for Hardware Obfuscation and IP Watermarking.
22. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units.
23. Hardware Obfuscation of AES through Finite Field Construction Variation.
24. An Orthogonal Algorithm for Key Management in Hardware Obfuscation.
25. Hardware Obfuscation and Logic Locking: A Tutorial Introduction.
26. A Perceptron-Inspired Technique for Hardware Obfuscation.
27. A hardware obfuscation technique for manufacturing a secure 3D IC.
28. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation.
29. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level.
30. Hardware Obfuscation Using Strong PUFs.
31. Preventing DNN Model IP Theft via Hardware Obfuscation
32. On the Construction of Composite Finite Fields for Hardware Obfuscation.
33. Protecting the Intellectual Property of Binary Deep Neural Networks With Efficient Spintronic-Based Hardware Obfuscation
34. A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication
35. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications.
36. Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs.
37. Comparative Analysis of Hardware Obfuscation for IP Protection.
38. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans.
39. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks
40. A Unified Methodology for Hardware Obfuscation and IP Watermarking
41. Hardware Obfuscation
42. Development and Evaluation of Hardware Obfuscation Benchmarks.
43. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
44. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art
45. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks
46. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
47. Development of a Layout-Level Hardware Obfuscation Tool.
48. Hardware Obfuscation Driven by QR Pattern using High Level Transformations
49. Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
50. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.