ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1605.00684
  4. Cited By
Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse
  Engineering Attacks

Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks

2 May 2016
M. Collantes
Mohamed El Massad
S. Garg
ArXiv (abs)PDFHTML

Papers citing "Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks"

8 / 8 papers shown
Title
Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout
  Camouflaging
Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Satwik Patnaik
M. Ashraf
Ozgur Sinanoglu
J. Knechtel
29
2
0
21 Mar 2020
Protect Your Chip Design Intellectual Property: An Overview
Protect Your Chip Design Intellectual Property: An Overview
J. Knechtel
Satwik Patnaik
Ozgur Sinanoglu
57
22
0
14 Feb 2019
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging
  into a Security-Driven CAD Flow for 3D ICs
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Satwik Patnaik
M. Ashraf
Ozgur Sinanoglu
J. Knechtel
36
11
0
16 Nov 2018
Algorithmic Obfuscation over GF($2^m$)
Algorithmic Obfuscation over GF(2m2^m2m)
Cunxi Yu
Daniel E. Holcomb
11
0
0
17 Sep 2018
Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout
  Camouflaging
Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Satwik Patnaik
M. Ashraf
J. Knechtel
Ozgur Sinanoglu
67
44
0
14 Nov 2017
Reverse Engineering Camouflaged Sequential Integrated Circuits Without
  Scan Access
Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access
Mohamed El Massad
S. Garg
Mahesh V. Tripunitara
39
74
0
28 Oct 2017
Threshold-based Obfuscated Keys with Quantifiable Security against
  Invasive Readout
Threshold-based Obfuscated Keys with Quantifiable Security against Invasive Readout
S. Keshavarz
Daniel E. Holcomb
37
6
0
23 Aug 2017
Design Automation for Obfuscated Circuits with Multiple Viable Functions
Design Automation for Obfuscated Circuits with Multiple Viable Functions
S. Keshavarz
C. Paar
Daniel E. Holcomb
41
9
0
01 Mar 2017
1