共 24 条
- [1] Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
- [2] [Anonymous], P 31 IEEE VLSI TEST
- [3] [Anonymous], 1994, SYNTHESIS OPTIMIZATI, DOI DOI 10.5555/541643
- [4] [Anonymous], P 51 ACM EDAC IEEE D
- [6] Chakraborty Rajat Subhra, 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), P674, DOI 10.1109/ICCAD.2008.4681649
- [7] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation [J]. 23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
- [8] Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 96 - 99
- [10] Chow Lap Wai, 2012, US Patent, Patent No. [8,151,235, 8151235]