Ephemeral Key-based Hybrid Hardware Obfuscation

被引:0
|
作者
Nasir, Neelam [1 ]
Ali Malik, Arsalan [1 ]
Tahir, Ifra [1 ]
Masood, Ammar [1 ]
Riaz, Naveed [1 ]
机构
[1] National Center for Cyber Security (NCCS), Air University, Islamabad,44000, Pakistan
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer circuits - Intellectual property - Locks (fasteners) - Malware - Reverse engineering - Supply chains
引用
收藏
页码:646 / 652
相关论文
共 50 条
  • [31] Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
    Chakraborty, Abhishek
    Srivastava, Ankur
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 549 - 554
  • [32] Evaluating Adversarial Robustness of Secret Key-Based Defenses
    Ali, Ziad Tariq Muhammad
    Mohammed, Ameer
    Ahmad, Imtiaz
    IEEE ACCESS, 2022, 10 : 34872 - 34882
  • [33] Secret Key-Based Identification and Authentication With a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (11) : 6189 - 6203
  • [34] Review of Key-Based Dynamic Trust Authorization Mechanism
    Wang, Jian-Jun
    Li, Jian-Ping
    Li, Yong-Fan
    Peng, Jing
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 263 - 267
  • [35] FPGA implementation of hybrid asymmetric key-based digital signature and Diffie-Hellman key exchange algorithm for IoT application
    Peroumal, Vijayakumar
    Krishna, Sujan
    Reddy, Harivamsi
    Ramakrishna, Polineni
    Jagannath, M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (05) : 534 - 546
  • [36] Secret Key-Based Image Steganography in Spatial Domain
    Gajabe, Rajashree
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2022, 22 (02)
  • [37] A Key-Based Error Control Scheme for Network Coding
    Silva, Danilo
    Kschischancy, Frank R.
    2009 11TH CANADIAN WORKSHOP ON INFORMATION THEORY, 2009, : 5 - 8
  • [38] On The Performance Bound of Structured Key-Based RFID Authentication
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Lai, Ten H.
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2019,
  • [39] Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches
    Tomasin, Stefano
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (09) : 5700 - 5712
  • [40] Program Obfuscation with Leaky Hardware
    Bitansky, Nir
    Canetti, Ran
    Goldwasser, Shafi
    Halevi, Shai
    Kalai, Yael Tauman
    Rothblum, Guy N.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 722 - +