Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,224,147 papers from all fields of science
Search
Sign In
Create Free Account
Hardware obfuscation
Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Adversary (cryptography)
Black box
Digital watermarking
Electronic circuit
Expand
Broader (2)
Electronic design automation
Electronic engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Hardware Obfuscation Using High Level Aggregation
V. Gorbachov
,
Abdulrahman Kataeba Batiaa
,
Olha Ponomarenko
,
Oksana Kotkova
COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES
2020
Corpus ID: 219646676
. The main principle of the proposed techniques is design obfuscation method to achieve hardware security. In -based obfuscation…
Expand
2019
2019
A Technical Report on Logic Obfuscation using Reconfigurable Logic and Routing Blocks
Hadi Mardani Kamali
2019
Corpus ID: 210146929
The increasing cost of building, operating, managing, and maintaining state-of-the-art silicon manufacturing facilities has…
Expand
2018
2018
Hardware Obfuscation for Finite Field Algorithms
Ankur A Sharma
2018
Corpus ID: 181973576
With the rise of computing devices, the security robustness of the devices has become of utmost importance. Companies invest huge…
Expand
2017
2017
Permutation-Based Obfuscation
Zimu Guo
,
M. Tehranipoor
,
Domenic Forte
2017
Corpus ID: 64193398
Hardware obfuscation techniques have been studied in preventing reverse engineering and piracy issues. One branch of these…
Expand
2017
2017
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
Nishanth Chandran
,
Wutichai Chongchitmate
,
R. Ostrovsky
,
Ivan Visconti
IACR Cryptology ePrint Archive
2017
Corpus ID: 3610189
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced…
Expand
2014
2014
IMPLEMENTATION OF OPAQUE PREDICATES FOR FPGA DESIGNS HARDWARE OBFUSCATION
V. V. Sergeichik
,
A. A. Ivaniuk
2014
Corpus ID: 61131220
Obfuscation is a technique, which makes design less intelligible in order to complicate reverse engineering. In this paper, we…
Expand
2013
2013
Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation
Avinash R. Desai
2013
Corpus ID: 111392845
2013
2013
Anti-Counterfeit and Anti-Tamper Implementation using Hardware Obfuscation
Avinash R. Desai
2013
Corpus ID: 61568495
2012
2012
Software and Critical Technology Protection against Side-Channel Analysis through Dynamic Hardware Obfuscation
John R. Bochert
2012
Corpus ID: 54097710
Abstract : Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining…
Expand
2008
2008
Immer wieder Kerckhoffs
D. Fox
Datenschutz und Datensicherheit - DuD
2008
Corpus ID: 42508146
Die Erkenntnis ist nicht nur alt, sondern ein Fundamentalsatz der modernen Kryptographie, formuliert von Auguste Kerckhoffs in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required