Skip to search formSkip to main contentSkip to account menu

Hardware obfuscation

Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
. The main principle of the proposed techniques is design obfuscation method to achieve hardware security. In -based obfuscation… 
2019
2019
The increasing cost of building, operating, managing, and maintaining state-of-the-art silicon manufacturing facilities has… 
2018
2018
With the rise of computing devices, the security robustness of the devices has become of utmost importance. Companies invest huge… 
2017
2017
Hardware obfuscation techniques have been studied in preventing reverse engineering and piracy issues. One branch of these… 
2017
2017
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced… 
2014
2014
Obfuscation is a technique, which makes design less intelligible in order to complicate reverse engineering. In this paper, we… 
2012
2012
Abstract : Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining… 
2008
2008
  • D. Fox
  • 2008
  • Corpus ID: 42508146
Die Erkenntnis ist nicht nur alt, sondern ein Fundamentalsatz der modernen Kryptographie, formuliert von Auguste Kerckhoffs in…