4.7 Article

Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption

Related references

Note: Only part of the references are listed.
Proceedings Paper Engineering, Electrical & Electronic

On SAT-Based Attacks On Encrypted Sequential Logic Circuits

Yasaswy Kasarabada et al.

PROCEEDINGS OF THE 2019 20TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED) (2019)

Proceedings Paper Computer Science, Theory & Methods

ScanSAT: Unlocking Obfuscated Scan Chains

Lilas Alrahis et al.

24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019) (2019)

Article Computer Science, Hardware & Architecture

Secure Scan and Test Using Obfuscation Throughout Supply Chain

Xiaoxiao Wang et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

Enhancements to SAT Attack: Speedup and Breaking Cyclic Logic Encryption

Yung-Chih Chen

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

Robust Design-for-Security Architecture for Enabling Trust in IC Manufacturing and Test

Ujjwal Guin et al.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2018)

Proceedings Paper Computer Science, Information Systems

Provably-Secure Logic Locking: From Theory To Practice

Muhammad Yasin et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Automation & Control Systems

A New Logic Encryption Strategy Ensuring Key Interdependency

Rajit Karmakar et al.

2017 30TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2017 16TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID 2017) (2017)

Article Computer Science, Hardware & Architecture

On Improving the Security of Logic Locking

Muhammad Yasin et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

A Practical Logic Obfuscation Technique for Hardware Security

Jiliang Zhang

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Mitigating SAT Attack on Logic Locking

Yang Xie et al.

CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016 (2016)

Article Computer Science, Hardware & Architecture

Fault Analysis-Based Logic Encryption

Jeyavijayan Rajendran et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Engineering, Electrical & Electronic

A Primer on Hardware Security: Models, Methods, and Metrics

Masoud Rostami et al.

PROCEEDINGS OF THE IEEE (2014)

Article Computer Science, Hardware & Architecture

TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS

Ramesh Karri et al.

COMPUTER (2010)