Linked e-resources

Details

Part 1: Hardware Obfuscation Preliminaries
Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
VLSI Test and Hardware Security Background for Hardware Obfuscation
Part 2: Logic-based Hardware Obfuscation
Logic Encryption
Gate Camouflaging-based Obfuscation
Permutation-Based Obfuscation
Protection of Assets from Scan Chain Vulnerabilities through Obfuscation
Part 3: Finite State Machine (FSM) Based Hardware Obfuscation
Active Hardware Metering by Finite State Machine Obfuscation
State Space Obfuscation and its Application in Hardware Intellectual Property Protection
Structural Transformation-based Obfuscation
Part 4: Hardware Obfuscation Based on Emerging Integration Approaches
Part IV Hardware Obfuscation Based on Emerging Integration Approaches
Split Manufacturing
Obfuscated Built-in Self Authentication
3D/2.5D IC based Obfuscation
Part 5: Other Hardware Obfuscation Building Blocks
Obfuscation and Encryption for Securing Semiconductor Supply Chain.

Browse Subjects

Show more subjects...

Statistics

from
to
Export