共 50 条
- [31] Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators 2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 549 - 554
- [32] Evaluating Adversarial Robustness of Secret Key-Based Defenses IEEE ACCESS, 2022, 10 : 34872 - 34882
- [34] Review of Key-Based Dynamic Trust Authorization Mechanism 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 263 - 267
- [37] A Key-Based Error Control Scheme for Network Coding 2009 11TH CANADIAN WORKSHOP ON INFORMATION THEORY, 2009, : 5 - 8
- [38] On The Performance Bound of Structured Key-Based RFID Authentication 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2019,
- [40] Program Obfuscation with Leaky Hardware ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 722 - +