共 30 条
[1]
Alaql A, 2019, PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST)
[2]
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[3]
[Anonymous], 2007, SBIR AWARD
[4]
Badier H, 2019, DES AUT TEST EUROPE, P1118, DOI [10.23919/DATE.2019.8715083, 10.23919/date.2019.8715083]
[5]
Chakraborty P, 2018, PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), P56, DOI 10.1109/AsianHOST.2018.8607163
[6]
RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
[J].
23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN,
2010,
:405-410
[7]
An Introduction to High-Level Synthesis
[J].
IEEE DESIGN & TEST OF COMPUTERS,
2009, 26 (04)
:8-17
[8]
Dupuis S, 2014, IEEE INT ON LINE, P49, DOI 10.1109/IOLTS.2014.6873671
[9]
Guin U, 2017, IEEE VLSI TEST SYMP